When comparing
the two statutory bodies, the European Union Cyber Security Act (hereinafter
referred as EU Act) covers a wide area of cyber-related issues where the Sri
Lankan Bill is more concentrated on developing a structural framework. Much
evidence could be provided in order to prove the respective statement.
According to S.7
and S.8 of the EU, Act highlights the importance of developing the awareness of
the general public while the Bill has not given due importance to developing
awareness factor. With the emerging level of technologically related
violations, the importance of public awareness cannot be underestimated.
Businesses, consumers do not have specific protection on the ICT products they use under the general law of Sri Lanka. The Intellectual Property Act makes an impact with the provisions of copyrights but those are not sufficient to protect the consumers per se. Though the proposed Bill has not identified the respective gap, the EU Law from S.10 of the Act has recognized and addressed the problem. They have also addressed the issue of the vulnerability created by ICT products, which was a step ahead with the developing technological advancements.
The interpretation section shows another significant problem. The EU Act has interpreted the terminologies accordingly but when one concentrated on the Bill ambiguities are visible. For example, According to S.21 of the Bill the term ‘cybersecurity incidents’ have not been interpreted. Therefore when an incident takes place, there’s no way of assessing the incident under cybersecurity as well as it could make a gap in the law even before the law is enacted. Failure to interpret the necessary terminologies can inevitably lead to different types of legal ambiguities.
However, the EU has a number of interpretation sections for terminologies used. For example with regard to an overview of Cyber Security and related terminologies, version I provides a clear explanation for the ‘Cyber Security incidents’. According to the section it’s defined as “Any occurrence that has an impact on any of the components of the cyberspace or on the functioning of the cyberspace, independent if it’s natural or human-made; malicious or non-malicious intent; deliberate, accidental or due to incompetence; due to development or due to operational interactions…” When one compares the Bill and the Act, the Act seems more informative and easier to use with simplified provisions where the Bill shows the lack of proper coverage of the respective subject.
Both the EU Act and the Sri Lankan Bill on certain instances accept the support of the SLCERT and the Bill has given a significant amount of responsibilities to them including handling cybersecurity issues. But no mechanism has been provided in the Bill to assist SLCERT with this regard.
According to S.4 (2) of the Bill, the Agency is required to consult the SLCERT when exercising their powers and duties. Even though it is understandable that SLCERT would have much more experience towards incidents due to a long period of active duty, it is unclear why the agency has to consult SLCERT all times. It would rather be acceptable if it specifies the subjects or areas, which needs the consultation
Risk Analysis
S.38 of the EU Act declares that ENISA should do a cyber risk analysis and assessment to find possible cyber threats to protect the members of the union. The Sri Lankan Bill has not included the risk analysis though it’s of high importance. For example, though Sri Lanka has less traditional cyber incident rates, in order to prevent terrorism cyber risk analysis can be used successfully. But the Bill does not provide for it.
Autonomy of the appointed CII
The Part IX 24 of the Bill states “The Agency or any other officer authorized in writing in that behalf by the Agency, for the purpose of ascertaining whether the provisions of this Act or any regulation made thereunder are being complied with may, on reasonable ground – (a) enter, inspect and search premises of the designated CIIs; (b) examine and take copies of any document, record or part thereof pertaining to such CIIs; (c) examine any person whom he has reasonable cause to believe that such person is an owner or employee of such CII…”This can be identified as a gap in the law. Without proper data protection laws and by not giving the protection of the courts to the section might lead to serious violations and a threat to the autonomy of the functions of the CII. It is better to grant power to enter CII through a warrant issued by the court with reasonable circumstances. The warrant should contain a name of an authorized CSASL officer, specify the document or records which are to be copied or taken and validation period of time.
Conclusion of the comparative analysis
Unarguably, compare to the EU Act, the Sri Lankan Bill does not cover the emerging issues in the area of cybersecurity. But as the first piece of legislature it provides a structural framework where one can develop on a step-by-step process. When analyzing the current provisions of the Bill, the establishment of the Agency and how CERT is used to develop the area of cybersecurity can be identified. But the Bill has not failed to remedy the prevailing issues through enacting specific law nor that it had created a mechanism to prevent them.
REFERENCE
Statutes
• Computer Crimes Act No. 24 of 2007
• Electronic Transactions Act No. 19 of 2006
• Cyber Security Bill
• Information and Communication Technology Act No.27 of 2003
• Intellectual Property Act No. 36 of 2003
• Payment and Settlement Systems Act, No. 28 of 2005
• Payment Devises Frauds Act No.30 of 2006
International Legislations
• EU Cyber security Act (European Parliament legislative resolution of 12 March 2019 on the proposal for a regulation of the European Parliament and of the Council on ENISA)
Online Articles
•Carrapico H and Barrinha A (2107), ‘The EU as a Coherent (Cyber)Security Actor? <https://onlinelibrary.wiley.com/doi/pdf/10.1111/jcms.12575>
•Feather Neil, ‘How new cyber law can help protect your business’, (Inc, 2019), <https://www.inc.com/neill-feather/how-new-cybersecurity-laws-can-help-protect-your-business.html> Accessed on 23rd September 2019
•Jayasekara D, Rupasinghe W (2015), Cyber crime in Sri Lanka’, < https://www.researchgate.net/publication/294725446>
•Oddermatt J (2018), ‘EU as a cyber security actor’, <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3144257>
•Senaratna B, ‘Dynamics in Cybersecurity: Challenges to Sri Lanka’s National Security
•’,<http://ir.kdu.ac.lk/bitstream/handle/345/1717/010.pdf?sequence=1&isAllowed=y>
•Vithana Nisa, ‘Decoding Sri Lanka's Cyber Security Bill 2019’, (Meta Defence Labs, 2019), <https://www.metadefencelabs.com/single-post/2019/06/06/Decoding-Sri-Lankas-Cyber-Security-Bill-2019> Accessed on 25th September 2019

No comments:
Post a Comment