Zambia Wants Tough New Online Regulations

The Zambian Government has drafted a new law that it hopes will address online behavior and introduce jail terms for those found guilty of misconduct on the Internet, a leaked draft Bill has shown.

The Cybersecurity and Cybercrimes Draft Bill, 2017 also allows authorities at any reasonable time, without prior notice, and on the authority of a warrant to enter any premises or access an information system and search any persons.

This is provided for if there are reasonable grounds to believe that the person or institution has possession of an article, document or record that has a bearing on an investigation and take extracts from, or make copies of any book, document or record that is on or in the premises or in the information system and that has a bearing on an investigation.

The Draft Bill also shows that Authorities will demand the production of, and inspect, relevant licences and registration certificates, inspect any facilities on the premises which are linked or associated with the information system, access and inspect the operation of any computer or equipment forming part of an information system. A person who refuses to co-operate with or hinders a cyber-inspector from conducting a lawful search or seizure commits an offence and is liable, upon conviction, to a fine not exceeding 100, 000 penalty units or to imprisonment for a period not exceeding one year, or to both.

The draft, which is expected to be tabled before Parliament for deliberations also indicates that a warrant to enter, search and seize may be issued at any time and shall identify the premises or information system that may be entered and searched and specify which acts may be performed there under by the cyber inspector to whom it is issued.

Authorities will also be allowed to install on the computer or computer system any software program or interconnect any equipment to the computer or computer system, for the purpose of the investigation and access, inspect and check the operation of a computer that the investigating officer has reasonable cause to suspect is or was impacted by a cyber-security incident.

A Board for the Zambia Cybersecurity Agency will be constituted and will comprise representation from the Zambia Air Force, Zambia Army, Zambia National Service, Zambia Police Service and Zambia Security Intelligence Services.

Lusaka Times

You Might Aso Read: 

Tough Rules Force Kenyan Net Users to List their Gadgets:

In S.Africa The Cybersecurity Skills Gap Is A Chasm:
 

 

« Five Mistakes US Cyberscurity Vendors Make In The UK
How To Use AI & Predictive Analytics »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

North West Cyber Resilience Centre (NWCRC)

North West Cyber Resilience Centre (NWCRC)

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

Pacific Northwest National Laboratory (PNNL)

Pacific Northwest National Laboratory (PNNL)

PNNL draws on its distinguishing strengths in chemistry, Earth sciences, biology, and data science to advance scientific knowledge and address challenges in energy resiliency and national security.