www.chilot.me
Federal Negaril Gazela No.90 August 29 th
E. ~'J'.1,) ""**9"
iii flc')(':C"'L7i') t7DL·fl J'.V')'/,)· A.)!'ir'I. (hll.V
11)."1 "n.)!HI." ~N~tI
I""l.mt·)
1'0''1
tlar'i'l' J'tI(I)' t·!l·') 1';J:tI I'<n")''lll')' (TOllt)'
/1, :1' if';' OII.V .I':)·fl 1,).1'.1'; 'hN:a<},tI::
!U lb)!,tI.ar " . m t " '/: tI m T <'I f? "'l. ',.11 .). .;.
j',if')tI::
'P,) t7D1lt! fl.'}
Ylb)!·)(I.(I)- 'P'; {Tu!lt;' (\.'). (I !I~lll I.rl'i 'U ";'
A,.I'. M6. <'I1.~'I: 11'''l'O:':(I)-9'' 1"'fJ:t- 'rC''''l'J:
t7Dllt! fl.,) , tlSt.ar j',:):<'ItI: :
ii.
[; . 'I <'I "'l
lb)!'}(I,ar f"'l.h,,·tI ..)· 'l<'l "'l,sv):
!il fl 111 t,,: 'T"P'l":y. <'If?
n:H,:C"'l,7i')
ltl flc ,(':C"'L7i'),; 1'1, ,(':C"'L7i'i t7DflL'I' tI"'l
fP'.'l"ht·fI. r
1.
faot\ll?"
M·I ·P'.I'.C'O
fllc ')(':C"'L7i')
EI
§I
I> Tt.7i ')
9"C9"C')
legal personali ty.
21 The Agency shall be accounta ble to the Prime
Minister.
4. " cad O ffice
The Agency shall have its head office. in Addis Ababa,
and Illay have branch offices elsewhere as may be
./'J'.t.l
II
7,1
,~.
IIC',:
21
to
defend
and take counter measures again st
ensu re
the
security
or
inrormation
and
information infrastructures to facilitate their use for
the
implementation
democratization,
of the
good
country's
peace,
governance
and
development programs.
6. Powers and Duties of the Agenc y
The Agency shall have the powers and duties to:
11 advise the government on in formati on
informat ion
infrastructure
security;
an d
crente
information security awareness through formal and
informa l ways in collaborat ion with the concerned
authoriti es;
21 based on rescareh and devel opment, bui ld th e
capacity or critical infrastructures on the areas of
information infrastructure security and informati on
Nt.lfJ:
'r'l:"'l')' ') AT?" M~~tI, '
I' 1c,)b.C"'L 7i/'1 I'll. ,)(,:C"'L 7i/ t7Dfll-I' tI"'l')")
J'.U')~')'
tI"'ll.?1'T'
f"'l.Pllltl·
fj'l.t-'l?
;T'tI.fI.,sv):') r v'H')'1 1l;J-')P,CF.):') J'1I.?:P,tI,
fl. OJ'.' 'I: 9" '1'6. '1"'l.',;J-:l'ar') j',h;J--I'IItI,
4?tI<t: ," ' 'I:'''l')'
fl ·fl'l.t-'l?
fh:)C:C"'L7i')
J'.V')~,)· TtI.flS Il;J-VIC.~· <'If? N aoflt.·,·
ft7Dt.:<l J'. V')'/,)· T tI.!lS 1l;J-')P,C.~· A')P,S
t-far f?!'."l1.tI , fl',,},)r,'(I)'9" 1.1l V',:'I"rc';
fP,M 'T''1')' .PJ'.C.?tI r fJ'.U')'/,)'
.eLY.
t'!C·I·'l.h,} J?fI"ltl (l)j',9" flM-:y. II~II')'
A')P,.fI'T' ar hN; j',fI"ltl , ,,:tI fJ: IIMY't·
'/''I:'''l')'9" M&.<'I1.(I)-') J'.' ;.>r,: j',!l'f]t.I,
nI17t·,: 1'°'1.'(1· I'lltT'Y' ·':t.ll;;"·') )'!I'"
P'.~·t-tl,
fhtT'Y·
9"C·y.:):-)
l,m;J" "9"';
llararC f?·Y'''lmt-tl,
OJ J'. 111 C I' "'l. 7fl'<; h 111 C \' "'l.(I) m· I' h. X;
C"'L Ii') l,o~.'t.l17i')r I' aot.:P, h ','J:c,' 6,,sv :Y.';
n:n:C"'L '/i') ,\':1") . .,; tI';· tI"li.P' ··j'· (HI 'U J /?
J'.V')~ ·) ·
<'If? tI.J'llh·)·tI· yo'!.:y.tI ..)··) /,Y.;.>
ht7Dh<'lhtl h,)lIC h"'l.t7Dtlh;J-'far hll'l')' ;.>C
flt7D·~c;~:-). j'"F>"lmt·tI,
to
information attacks targeted at the national interest;
operation technologies; ,
31
formulate nati onal policies, laws and standards th at
enable to ensure information and inrormati on
infrastructure
security
an d
monitor
their
enforccmcnt upon approval;
41
support
critical
infrastructu res
to
develop
informa tion security policy and standards based on
nationa l informati on security pol icy and standards:
conduct, at an y time, auditing and assessment, and
fl:J+
(;/
"
necessary.
l'tI"7')'
,~tJ';'tI-}t,sv:r
aoflt.·)·
Agency
(hereinafter the "Agency") is hereby re -esta blished
fM9"r
t7DC'1 "l'flcl "'lM.'!."'l.! A ')P,.if~· "'l1lJ't.I ::
flb)!')(I,ar Iltl"l,),) 1'''l~C
A,)!')!l.ar f"'l.l1·h'l") · Ilt.l"l'i'; 'I·~t··)· f?'~~.:J't.I :!il (11, ,)(':C"'l,7i')'O !,:)(':C"'L7i') t7DfI{:-I' t.I"7}
.1'. v')~·)· lI·t./' ao')"lll')" ,P"'lht-tl , h"'l.ao
tlh;J-'far A~<'I ')' .?C flt7D'~,))! ')'9" flaoJ'.flr,''O
' ao.l'.flr,' ~tlif~ '
t7D')l,1q:
II1t·7? I'!,:)(,';C
"'L 7i ') ,r, V')', ,) · '},!P '1' U tiS I, ') P,. 6. m C
./'J'.C.?tI ,
!U fllc ')(,: C"'1.7i')
t7D!lL'I'
tl m / ,) .
.I'.U')'/,)·o,·
'T''O')'')')
Security
as an au tonomous public agency havin g it s own
'T' ,!Pf, :y.') t7DMhM- M4-'/~ 9"<'I7i t7Dllm,)-j
.y.:y.') !"u·)~,) · fl"'lt.;J'/'T' flllt'I:')
Network
5. Objectives
The Agency shall have the following objectives :
f?';'~. ;J-tl :-
r"'l.!l)II~.
3. Re- cstoblishment
II The Inrormation
2011 Page 6177
prov ide security sta!1dards approval certifi ca te or
de lcgate other bodies to pe rrorm such fu nc ti ons;
and in add ition, provide appropriate support for
institutions other than criti cal in frastructurc s:
51
admin ister crypto keys that ex ist in the country and
monitor crypto products and movem ents;
61 in cooperation with the concerned auth orities.
contro l the import and export of information
communication,
information
Sl:ll sn r
and
information attack technologies with rcsrcc t to
avoidance of tlireat to national security;