KM1- Mapping cybersecurity and the broader context
KM 2 - Cybersecurity strategy, policy and regulation
KM3 - Cyber diplomacy and international cooperation
1 of 4

2.3. Norms, confidence building measures, and capacity building

2.3.1. Voluntary norms


🎯What are the norms?

🎯How do they interplay with international law?

🎯How to implement them across African states?

Norms present standards of behaviour, shaped through terms of rights and obligations. Though non-binding, they reflect expectations, increase predictability, reduce risks of misperceptions, and contribute to conflict prevention.

Illustrations: Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS (Source: New America)

While not replacing binding obligations of states under international law, norms and principles agreed on by the UNGA have the highest authority. In the context of cyberspace, norms are particularly important for peacetime operations to address aspects that are not sufficiently or clearly covered by existing international law.

The Framework outlines and elaborates on 11 norms for responsible state behaviour in cyberspace (figure).

Figure: Eleven UN norms for responsible state behaviour in cyberspace adopted by the UN GGE in 2015 (Source: ASPI)

Case study

Putting Cyber Norms in Practice: Implementing the UN GGE 2015 recommendations through national strategies and policies”, a report written by Mika Kerttunen and Eneken Tikk, commissioned by the GFCE with support from the UK FCDO through the Global CCB Research Agenda 2021 process, provides a number of case studies to showcase approaches that can be, and have been, adopted to implement norms of responsible state behaviour which are part of the Framework. The guide includes notable examples from African countries as well.

Mauritius, for instance, has undertaken a number of steps towards stopping crime and terrorism, which have directly contributed to implementing the UN GGE norm on cooperating to stop crime and terrorism (13(d)). Major steps include: Prevention of Terrorism Act (2002) has included information systems in the description of terrorism acts; Computer Misuse and Cybercrime Act” has defined cybercrimes (2003); Mutual Assistance in Criminal and Related Matters Act (2003) which sets the basis for international cooperation; National Cyber Security Strategy (2014) prioritised defence against cybercrime; Cybercrime Strategy (2017) calls for more effective law enforcement and criminal justice response, emphasises the harmonisation of legal frameworks in its anti-cybercrime approach, and sets working with international counterparts as one of the seven goals; Mauritian Cybercrime Online Reporting System (MAUCORS) was designed to facilitate secure online cybercrime reporting and develop a better understanding of the cybercrime affecting citizens. Kenya is another good example of contributing to this norm, as it is a member of the Commonwealth, Harare Scheme and London Scheme relating to Mutual legal assistance in criminal Matters within the Commonwealth.

Notable examples of contributions to the implementation of the norm related to interstate cooperation on cybersecurity (13(a)) are the Economic Community of West African States (ECOWAS) Regional Cybersecurity and Cybercrime Strategy (2021), and the South African National Cybersecurity Policy Framework (2015). Norm related to respect human rights and privacy (13(e)) is moved forward by the parliament of the Ivory Coast, which recognised and affirmed that access to the Internet and to electronic communication networks is a fundamental human right and a universal good. Similarly, Ghana Cybersecurity Act which facilitates the cooperation between the national CERT with CERTs from other countries contributes to the norm related to not harming the emergency response teams (13(k)).

(page 1/3)

New post

Your email address will not be published. Required fields are marked *

1 post
Collapse posts
Skip to content