(j) Take measures to protect and educate consumers with different access needs who may be
particularly vulnerable to deceptive commercial practices or have difficulties fully
understanding terms and conditions of service.

15 SECURITY
15.1 Cyber Security
15.1.1 Introduction
Technological innovation and increased adoption of the electronic platform in the delivery of services
has moved the Internet and related platforms from the periphery to the core of deliberations on the
efficient utilization of technologies. Cyber security spans a wide range of technologies, systems, and
users and it has become a national priority for the articulation of new integrated and comprehensive
strategies for issues arising in this domain to approached in a holistic manner.
Globalization and the pervasiveness of the Internet have given rise to new types of needs, rights and
vulnerabilities. For secure electronic transactions to occur, an environment of trust must be created
and sustained through the legal and regulatory apparatus. Cyber- criminals around the world are
constantly seeking loopholes through which to perform illegal or illicit businesses. Any country that
has inadequate cyber-law is essentially offering a safe-haven for cyber-criminals to act with impunity.
The Government will create and sustain a secure cyber-law environment, in addition to already
existing legislation.
15.1.2 Policy Objectives
(a)
Establish cyber security as a key objective of national security and establish sufficiently
empowered office/agency to cover it;
(b)
The new generation of national cyber security strategies aimed at driving economic and social
prosperity while at the same time protecting cyberspace reliant societies against cyber
threats;
(c)
Support the development of a new generation of technologies that will lead to measurable,
available, secure, trustworthy, and sustainable computing and communications systems, as
well as associated management and policy tools that enable successful utilization of the new
technologies;
(d)
Development information security standards for the ICT sector which are to be adopted and
applied by all government agencies and recommended as best practices to private sector
business. Sensitization and awareness of citizens will enhance the adoption of information
security approaches and point towards the adoption of new attitudes and culture;
(e)
Development of appropriate legal and regulatory frameworks, technical solutions, law
enforcement strategies within which diplomatic and intelligence related mechanisms will be
called upon as appropriate for the detection and prevention of cyber threats given the extra
territorial nature of cyber threats;
(f)
This policy recognizes that vulnerable populations such as children will require special focus
to ensure that they are safe and derive value from the cyberspace;
(g)
Make the delicate balancing act of ensuring the efficient mitigation of cyber threats in order
to promote trust and confidence with the objective of preserving the openness of the Internet
as a platform for innovation and new sources of growth;
34

Select target paragraph3