Table of contents
Declaration .............................................................................................................................................. ii
Approval ................................................................................................................................................ iii
Dedication .............................................................................................................................................. iv
Acknowledgements ................................................................................................................................. v
List of acronyms ..................................................................................................................................... vi
List of cases .......................................................................................................................................... vii
List of statutes ...................................................................................................................................... viii
Table of contents .................................................................................................................................... ix
Abstract. ................................................................................................................................................ xii
CHAPTER ONE ..................................................................................................................................... 1
1.0 Introduction ....................................................................................................................................... 1
1.1 Background of the study .................................................................................................................... 1
1.2 Statement of the problem ................................................................................................................... 5
1.3 General Objective of the study ........................................................................................................... 5
1.4 Specific Objectives of the study ......................................................................................................... 5
1.5 Research questions ............................................................................................................................ 6
1.6 Scope of the study ............................................................................................................................. 6
1.7 Significance of the study .................................................................................................................... 6
1.8 Methodology ..................................................................................................................................... 7
1.9 Literature review ............................................................................................................................... 7
1.10 Chapterization ............................................................................................................................... 21
CHAPTER TWO .................................................................................................................................. 22
LEGAL FRAMEWORK ON CYB ER SECURITY IN UGANDA ......................................................... 22
2.0 Introduction ..................................................................................................................................... 22
ix
2.1 Electronic Transaction Act. .............................................................................................................. 22
2.2 The Electronic Signatures Act.. ........................................................................................................ 23
2.3 The Computer Misuse Act ............................................................................................................... 23
CHAPTER THREE ............................................................................................................................... 26
CHALLENGES ASSOCIATED WITH CYB ER CRIME ...................................................................... 26
3.0 Introduction ..................................................................................................................................... 26
3.1 Reliance on ICTs ............................................................................................................................. 26
3.2 Number of users .............................................................................................................................. 27
3.3 Availability of devices and access .................................................................................................... 28
3.4 Availability of information .............................................................................................................. 29
3.5 Missing mechanisms of control ........................................................................................................ 30
3.6 Independence of location and presence at the crime site ................................................................... 30
3.7 Automation ...................................................................................................................................... 31
3 .8 Resources ........................................................................................................................................ 32
3.9 Conclusion ...................................................................................................................................... 32
CHAPTER FOUR ................................................................................................................................. 34
STRATEGIES IN THE FIGHT AGAINST CYBERCRIME .................................................................. 34
4.0 Introduction ..................................................................................................................................... 34
4.1 Implementation of existing strategies ............................................................................................... 34
4.2 Regional differences ........................................................................................................................ 34
4.3 Relevance of cybercrime issues within the pillars of cyber security .................................................. 35
4.4 A cybercrime policy as starting point ............................................................................................... 35
4.5 Responsibility within the government .............................................................................................. 36
4.6 Defining the different components ................................................................................................... 36
4.7 Determination of stakeholders .......................................................................................................... 37
X
4.8 Defining key topics for legislation ................................................................................................... 38
4.9 Legal measures ................................................................................................................................ 39
4.10 Conclusion .................................................................................................................................... 40
CHAPTER FIVE ................................................................................................................................... 42
LEGAL PENAL TIES AND CONTRIBUTIONS TO THE ELIMINATION OF CYBER CRIMES ....... 42
5.0 Introduction ..................................................................................................................................... 42
5.1 United Nations and United Nations Office on Drugs and Crimes ...................................................... 42
5.2 International Telecommunication Union .......................................................................................... 44
5.3 European Union ............................................................................................................................... 45
5.4 The Commonwealth ........................................................................................................................ 46
5.5 Conclusion ...................................................................................................................................... 46
5.6 Recommendations ........................................................................................................................... 47
References ............................................................................................................................................. 49
Abstract Thii; report provides a comprehensive overview of the most relevant topics linked to the legal aspects of cybercrime and focuses on the demands of developing countries. Due to the transnational dimension of cybercrime, the legal instruments are the same for developing and developed countries. However, the references used were selected for the benefit of the case study (Uganda), in addition to a broad selection of resources provided for a more in-depth study of the different topics. Whenever possible, publicly available sources were used, including many freeof-charge editions of online law journals. The report contains five main chapters. After an introduction (Chapter I), it provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and denial-of service attacks. An overview of the causes of cybercrimes in Uganda and the world at large, prosecution of cybercrirne (Chapters 3 and 4). After a summary of some of the activities undertaken by international and regional organizations in the fight against cybercrirne and also it continues with an analysis of different legal approaches with regard to substantive criminal law, procedural law, digital evidence, international cooperation and the responsibility of Internet service providers (Chapter 5) discusses the conclusions and recommendations to the study.