www.chilot.me

Federal Negaril Gazela No.90 August 29 th

E. ~'J'.1,) ""**9"
iii flc')(':C"'L7i') t7DL·fl J'.V')'/,)· A.)!'ir'I. (hll.V
11)."1 "n.)!HI." ~N~tI
I""l.mt·)
1'0''1
tlar'i'l' J'tI(I)' t·!l·') 1';J:tI I'<n")''lll')' (TOllt)'
/1, :1' if';' OII.V .I':)·fl 1,).1'.1'; 'hN:a<},tI::
!U lb)!,tI.ar " . m t " '/: tI m T <'I f? "'l. ',.11 .). .;.
j',if')tI::
'P,) t7D1lt! fl.'}
Ylb)!·)(I.(I)- 'P'; {Tu!lt;' (\.'). (I !I~lll I.rl'i 'U ";'
A,.I'. M6. <'I1.~'I: 11'''l'O:':(I)-9'' 1"'fJ:t- 'rC''''l'J:
t7Dllt! fl.,) , tlSt.ar j',:):<'ItI: :

ii.

[; . 'I <'I "'l
lb)!'}(I,ar f"'l.h,,·tI ..)· 'l<'l "'l,sv):

!il fl 111 t,,: 'T"P'l":y. <'If?

n:H,:C"'l,7i')

ltl flc ,(':C"'L7i'),; 1'1, ,(':C"'L7i'i t7DflL'I' tI"'l
fP'.'l"ht·fI. r

1.

faot\ll?"

M·I ·P'.I'.C'O

fllc ')(':C"'L7i')

EI

§I

I> Tt.7i ')

9"C9"C')

legal personali ty.
21 The Agency shall be accounta ble to the Prime
Minister.
4. " cad O ffice
The Agency shall have its head office. in Addis Ababa,
and Illay have branch offices elsewhere as may be

./'J'.t.l

II

7,1

,~.

IIC',:

21

to

defend

and take counter measures again st

ensu re

the

security

or

inrormation

and

information infrastructures to facilitate their use for

the

implementation

democratization,

of the
good

country's

peace,

governance

and

development programs.
6. Powers and Duties of the Agenc y
The Agency shall have the powers and duties to:
11 advise the government on in formati on
informat ion

infrastructure

security;

an d

crente

information security awareness through formal and
informa l ways in collaborat ion with the concerned
authoriti es;

21 based on rescareh and devel opment, bui ld th e
capacity or critical infrastructures on the areas of
information infrastructure security and informati on

Nt.lfJ:

'r'l:"'l')' ') AT?" M~~tI, '
I' 1c,)b.C"'L 7i/'1 I'll. ,)(,:C"'L 7i/ t7Dfll-I' tI"'l')")
J'.U')~')'
tI"'ll.?1'T'
f"'l.Pllltl·
fj'l.t-'l?
;T'tI.fI.,sv):') r v'H')'1 1l;J-')P,CF.):') J'1I.?:P,tI,
fl. OJ'.' 'I: 9" '1'6. '1"'l.',;J-:l'ar') j',h;J--I'IItI,
4?tI<t: ," ' 'I:'''l')'
fl ·fl'l.t-'l?
fh:)C:C"'L7i')
J'.V')~,)· TtI.flS Il;J-VIC.~· <'If? N aoflt.·,·
ft7Dt.:<l J'. V')'/,)· T tI.!lS 1l;J-')P,C.~· A')P,S
t-far f?!'."l1.tI , fl',,},)r,'(I)'9" 1.1l V',:'I"rc';
fP,M 'T''1')' .PJ'.C.?tI r fJ'.U')'/,)'
.eLY.
t'!C·I·'l.h,} J?fI"ltl (l)j',9" flM-:y. II~II')'
A')P,.fI'T' ar hN; j',fI"ltl , ,,:tI fJ: IIMY't·
'/''I:'''l')'9" M&.<'I1.(I)-') J'.' ;.>r,: j',!l'f]t.I,
nI17t·,: 1'°'1.'(1· I'lltT'Y' ·':t.ll;;"·') )'!I'"
P'.~·t-tl,
fhtT'Y·
9"C·y.:):-)
l,m;J" "9"';
llararC f?·Y'''lmt-tl,
OJ J'. 111 C I' "'l. 7fl'<; h 111 C \' "'l.(I) m· I' h. X;
C"'L Ii') l,o~.'t.l17i')r I' aot.:P, h ','J:c,' 6,,sv :Y.';
n:n:C"'L '/i') ,\':1") . .,; tI';· tI"li.P' ··j'· (HI 'U J /?
J'.V')~ ·) ·
<'If? tI.J'llh·)·tI· yo'!.:y.tI ..)··) /,Y.;.>
ht7Dh<'lhtl h,)lIC h"'l.t7Dtlh;J-'far hll'l')' ;.>C
flt7D·~c;~:-). j'"F>"lmt·tI,

to

information attacks targeted at the national interest;

operation technologies; ,

31

formulate nati onal policies, laws and standards th at
enable to ensure information and inrormati on
infrastructure

security

an d

monitor

their

enforccmcnt upon approval;

41

support

critical

infrastructu res

to

develop

informa tion security policy and standards based on
nationa l informati on security pol icy and standards:
conduct, at an y time, auditing and assessment, and

fl:J+

(;/

"

necessary.

l'tI"7')'

,~tJ';'tI-}t,sv:r

aoflt.·)·

Agency

(hereinafter the "Agency") is hereby re -esta blished

fM9"r

t7DC'1 "l'flcl "'lM.'!."'l.! A ')P,.if~· "'l1lJ't.I ::
flb)!')(I,ar Iltl"l,),) 1'''l~C
A,)!')!l.ar f"'l.l1·h'l") · Ilt.l"l'i'; 'I·~t··)· f?'~~.:J't.I :!il (11, ,)(':C"'l,7i')'O !,:)(':C"'L7i') t7DfI{:-I' t.I"7}
.1'. v')~·)· lI·t./' ao')"lll')" ,P"'lht-tl , h"'l.ao
tlh;J-'far A~<'I ')' .?C flt7D'~,))! ')'9" flaoJ'.flr,''O
' ao.l'.flr,' ~tlif~ '
t7D')l,1q:
II1t·7? I'!,:)(,';C
"'L 7i ') ,r, V')', ,) · '},!P '1' U tiS I, ') P,. 6. m C
./'J'.C.?tI ,
!U fllc ')(,: C"'1.7i')
t7D!lL'I'
tl m / ,) .
.I'.U')'/,)·o,·
'T''O')'')')

Security

as an au tonomous public agency havin g it s own

'T' ,!Pf, :y.') t7DMhM- M4-'/~ 9"<'I7i t7Dllm,)-j
.y.:y.') !"u·)~,) · fl"'lt.;J'/'T' flllt'I:')

Network

5. Objectives
The Agency shall have the following objectives :

f?';'~. ;J-tl :-

r"'l.!l)II~.

3. Re- cstoblishment
II The Inrormation

2011 Page 6177

prov ide security sta!1dards approval certifi ca te or

de lcgate other bodies to pe rrorm such fu nc ti ons;
and in add ition, provide appropriate support for
institutions other than criti cal in frastructurc s:

51

admin ister crypto keys that ex ist in the country and
monitor crypto products and movem ents;

61 in cooperation with the concerned auth orities.
contro l the import and export of information
communication,

information

Sl:ll sn r

and

information attack technologies with rcsrcc t to
avoidance of tlireat to national security;

Select target paragraph3