Sunteți pe pagina 1din 8

\

FEDERAL NEGARIT GAZETTE '.


'. f J'r.:. 'Jon:" 4rl'C ~ {I h/"f- k ~ 4~t-1'\ 'P. .c;. tfP" t-"- J''P. t T 11t\." 20 th Year No.6
:J'"l)lI Ir!l"''' ~lU 'u.. ADDIS ABABA 2 nd January, 2014
1.1'1 Mil f,.n1"fI ,.0)11f-1' 9"hC 0.'''' ml]+,~,,,, fOJ'"

CONTENTS

Proclamation No. 808/2013

f h.'}C:COIJ:Ii'} ool,n ~,n~'''' }b~'}"- "'1.1e; Information Network Security Agency Re-
lTfJ'J:'J: OII.,f 1',fJ)~ ...... , ....... , ........ ,1" l7I.iffli establishment Proclamation ............ Page 7129
1\'1''1: 41'1'C ~f~/ml PROCLAMATION No. 808/2013

fh.1t::C"I7i1 OD~'" R.tJ1~+ h.l1(l1 A PROCLAMATION TO RE-ESTABLISH THE


A1R.1'i" ""7**'"
fmllJ 1l"'~
INFORMATION NETWORK SECURITY
AGENCY
(Jt'IDlI4.~'" I'\.f, J'II.. fh1t'l: "~At;: WHEREAS, it has become necessary to
t'ID()l'" A lTfJ.y.1 ''itS h.'}J;.lI,"'tPJ 1 ensure the security of advancing critical
mt9"'I;dJ""C I'\.f, f,.t'ID()l': ht'mlfe;:r:OJ :JC infrastructures and industries of the country that are
.,. J' .f,,' 11.'1':1>'-" (Jt'ID:JII."',:r:OJ "e; 011.&.'" J',(JA1' vulnerable and going to be more vulnerable to an
." :JI'\ 6 / .b "flf~ ftlll.Y.J;. (Junlfe;:fdJ attack due to their reliance on computer;
l.,n~ ;J:r:dJ) lTfJ l."J1'1' 1',lI&'1'\1, lft; (Joo 1 ")" -,: ~

mt9"'l;dJ""C'l' 1',1t-fJ!
"e; (}II.9" 1',"'~Cf! WHEREAS, it has become necessary to
''''lIliC 9"tn.f'" f'''&'mldJ' ftt.f,(JC 9"1I~C protect the cyber space which is created by the local
II. fI"'bt-'P. l.,n~'" lI:J,'" "')~ .f,lf'} t'mhl'\hA and international computer networking, so as not to
1',lI&'I'\'I, lftj (J,.ID 1)"I:: be a national security threat;
h.)(;:COIJ:Ii} "~A t;: lTfJlJ(lt-'P.: ;r II. .t;II'P. WHEREAS, it has become imperative to
"e; h.Jttjt"l..J''P. Y'n'" (Jm)lf~ II.1.,n~': 1'(J:I> ensure the security of information, as information is
lTfJ.f.l O} OJtti lftj (Jm'1'Y,,:; invaluable social, political and economic asset;

'n"'bt-'P. 1':"9"') "e; fU...,:y} t'm'n'" WHEREAS, it is essential to secure


II.lTfJl:J11' h.H;:COIJ:1i1 "e; tt9"'l;dJ""C'} information and critical computer based
m'()l'''' J'1.l1- "~At;: t'm()l'" AlTfJf:Y l.,n~"'} infrastructure in order to ensure the national interest
lTfJl:J',1' o)tti lftj (I I'm 1')",: : and citizens' right;

h:)f.... ctI?:Ii} he; tt9"'CdJ""C'} t'm()l'''' WHEREAS, it has become necessary to


J' I.l1 "~A t;: oo()l'" A lTfJ'" I.lJ'a'"
II.t'.mllln:" establish strong institution that coordinates national
fOlI.1.l1OJ} 1', "t-fJ! 1'l'''' f"'l.J',,e; ~ he; efforts to realize the security of information and
'(J,,'bt-fJ! ftt.f,nC I.lJ'a'"
;rt\.,,- he; lI,"'t-'I:1(') critical computer based infrastructures and capable to
(J11:J>'''' lTfJlI&.?t9" f'"(:;'A m '}IIt- .,.'J:9" implement national cyber security policy and strategy
un 1') l] ,.,. (J lTfJ II &. II. 'J- : effectively;
NOW, THEREFORE, in accordance with
(Jh. ,"'r'A- .r 41.t-1'\'P. J;,. '1tlt."-J''1!
Article 55( I) of the Constitution of the Federal '
tT1111..h 111 un'}O}lI'''' 1','}"''''' !l{;(fi) t'm()l''''
Democratic Republic of Ethiopia, it is hereby/
fll'l.h"II.dJ ;JdJ-:~:.A: :
proclaimed as follows:
i. 1\"..C C/Jia 1. Short Title
.f", 1',fJ)~ "fh:H.:CtIIJ,Ii'} t'ml.,n 1.111',..,. This Proclamation may be cited as the
lb~'}"- h'}1. 1 t,.. lTfJ'J:'J:II'1.J' 1',fJ'~ "~1'C "Information Network Security Agency Re-
_ . - / . :,.r:~" J. I .1. ....
~r~ gil... '.1 h" t\.(Th-li .f,II'\A: establishment Proclamation No. 808/2013."

"~ 'I';J tt ;J ILIlJ 7'. Uf ~ ili'i.?i


~ ;J
TT",: t Prirp Negarit G. P.O. box 80001
'Ill.' :i,i'l.~.~I!J t ...r..t.A ,,;)(.,1- .~tI_n, "~1r. ~ ;J'ut}{'J ?!!~ "-1 ~iU (U" Federal Negarit Gazette NO.6 2 nd January 2014 .... .. .. . . .. page 7130

I. :"C~OJ 2. Definitions
f 'p1\. }',1 l HJ t\.~ :~C'r~ t.~(alllOJ (){l'~"'C In this Proclamation unless the context
nil.II )" CJ):e- OJ' ra l' : - otherwise requires:
?if "h.'}~:cOIJ:Ii'}" ("11\'''' h("I'P1OJ'~ 1'~ 1/ "information" means an asset generated
.v, ;J- ftTIl IIJ 'I hl.b lJ.f:~ 6: n611-":-: from any raw data obtained in the form of
lI~raA: ntlC ;J' mY,~ nt\.~ (lTrp10J'~ audio, texts, visual, map or orchestrated in
auAh '~"''1ll'{)c- f'Tl/.1~ U,{):~ (Ur} any form including codes and programs
("I'liif:r-'} 1\("11111 'AS I\m)~/,,:~ used to command and control machines;
ftTI/. y', l\ <1/1\ t,p. :""} he; Tc:al t..'I P :}'-'}
.flll,PA~A :
~/ "t'~'L:OJ"~C" ("ll\:~ n(a,,::~CJ!C he; 2/ "computer" means any software and
7 J',hc-:f.T 'I:hifl\":{ ~y, f,~m)(aL'" microchips technology based data
fV,;J' TC:(an'}CJ/: h~:"':h :~'}.~e;: processing, data storage, data analysis,
ra C hl.b.'" -: 01 T'i 'I'''' m y, ~ t\.1\" :r' Y. 1)1llJ: data dissemination and data
m y, ~ )" IIJ h'}\"}', cr. ,,<11 II I,,:"'} communication device or any device that
{.ltTI/.,fhe;OJ'} ("I'}~OJ'~ aul)tf '1OJ': is capable of performing logical,
arithmetic or routing, functions;
1:/ "tl~'L:OJ""C'} IIJ(aL'''' ,f f.L1 "~A": 3/ "computer based critical infrastructure"
au (a L'" A ("I :,.." ("ll\ :,. h.'}~. ra:,. t ,f lJ: includes industrial control systems,
{.I'h1'1'C raC'}'y, :""}: f h:}~:COIJ. 'Ii'} information management systems and
("I~:e-IIJ'F" raC'}.y.:r, he; IIJ(aL'" infrastructures, cyber and telecom
A 7,y,:r,'}-: fl)y,nC f'l:t\.tl~
he; infrastructures, electromagnetic systems ,
IIJ(aL'" A 7,y,1"'}: 'bt\.h''''C:7<1/~'th geospatial infrastructures, military
IIJ(aL'" A 7,y,1" : f:{~ra:rif A IIJ(aL'" command and control infrastructures and
A ("I.y.1": m;J'f.t..lJ: fhll he; "~1'1'C any other infrastructures or systems that
ra C I} .y.1" m y, ~ h:}~: C 01. 'Ii 'r}
analyze, disseminate, store and retrieve
l\ an."'}.~'}: l\'"1 (at.. (.1.1. :,..: l\ ("lh("I:':''''
information;
he; IIJA(a l\7<1J"r,.,. {) tTI/.fra:",1\.
t\.1\":r' au(aL'" A ("I'y,1"'} mf,~
raC'},Y,:r'} .fm.pA ~A:

Q/ "'I~A": an(aL,.. A("I:"''' 7l\:,.. l\1'.P'''' 4/ "critical infrastructure" means an


h,,, :Jl\lIl IltIl",J f.tr}'1:'" he; '{),I.. t..cr. infrastructure that can have considerable
l' :""p :r'
~ y, h,,:" ~ 'rv,:,.. 1\. f ra h,.,. A damage on public safety and the national
f""l.1'-A m(aL'" A ("I:'" '1OJ': interest, if attacked;

(;/ "1' 'p'''''' 7 l\'''' t'~'l: OJ""C'} m(aL'''' 5/ "attack" includes destruction of computer
ff.L1 'I~A": an(aL'" A("I:'" {.I,,.~?~
based critical infrastructures or disruption
}" 11.\ <111\"1, h'}~ J',(}1' OJJ','r h '}J;,OJ.f:'r
tI?f:L<I/,} OJJ','r rll.}(;:COIJ,'iiT}
of their services or obliterating the
,,-'} l"l"l. ',.1-: tI"I. ra1' t- q~.,.1- OJ J', 'JU
confidentiality, integrity or availability of
'''f.t.. 'Ii 'I'''' l"ll)(fl:~'} mY,~
information or computer based
t'~'l: OJ""C'} IIJ(aL'''' }'"f.:C1 lHL 11',
psychological attack on citizens or digital
ra'l A (l e; ~ J', f tTli. (a 'I II C 1'.p:",'} my, ~ identity theft perpetrated by different
A f. A f. IIY..,9J 1"'} nalJmcf'~ rtTII.~.~~ techn: ques;
r7'}','''' raC$'''' '''''IllC'} fm.PA~A:

~/ "ff.U'}"'-'" ~Jt:,.." ("ll\:,.. t,~"COJ"'-C'} 6/ "security audit" includes conducting


IIJ(aL'''' llf.L1 "~A": IIJ(aL'~ Al"l:'" penetration testing to computer based
~J', .":J~hl.b'l:""} l\7m:" fllAc~ 1 ' {) critical infrastructures to identify
,,>H'.. ~<l/llt..:""} ("lhe;m '} he; }',1t..lJ: vulnerability or assessing institutions'
f h. '}~:COIJ. 'Ii'} ;r I\.n he; ra;J"}.V, C .~"} information security system pursuant to
alJ(aL'''' II ("I.f: I. OJ f,..*7 :,..'} the national information policy and
Federal Negarit Gazette NO.6 2 nd January 2014 ............. page 7131

f h:}(~:COIJ, 'Ii'} Y..,T,."" flC(}''''' standard and ordering, if necessary,


IIm'1?"1?,, h'}Y.}',flL"1,',.,: fhC?"''''' corrective measures to be taken;
'hC?"if9'1' h'}-'ta){'~, ("I.f.:I."/,}
y, (.1.1. ?" ~ A :
XI "fY.IJ'}',..,.. lj:."i'f he; "/?,,1f"J" ("11\:" 7/ "security testing and evaluation" means
1I}',"~lJ~ f y'U'}~:,.. fl:J"}P'C J'.: he; pre-development, pre-procurement or pre-
m)(mll~ IlI()I.''''' f h:}~:C(IIl'li'} deployment testing and evaluating
'I:h'i h"j{ ?"c.y. :t,,}: flC(}.y.1,,} mf.?" information technology products, services,
f fl t 'iy'f :t, f:" .f.' m'A '''1:1': :" .f, m, systems and process, pursuant to national
"1'1 r. 01 f. ?" :" .f.' an :" 1 II I,. lj: .I' i)' he; security standards and criteria;
"/?,,"'''1 f'''I.f.I.1 ,,<J/llC ~OJ':

'1;1 "~f?"';OJ""C }!:'}1"'~ }"y':) ?",,'li 8/ "computer emergency response center"


anflt."J. ("I6hA" '''11\''''' IIh:}~:C(IIl'li'} means a center which is responsible for
he; fl?"";OJ"I'C'} IlI"'I.''''' llY.I." detecting, analyzing, warning citizen,
IlI()I.'" A f"J,.,.. "y. flll/.... ~IIC l' ,p,.,..'} recommending measures to be taken,
t\RJh"hA h'}-'t:FA fl' ,p .,.. devising recovery mechanisms on the .
}',Y.:)9'1','} }',fl"~ .f.''10 fIlII\ f.,..: issue of information and computer based
(" IlI''''}''''}: Ib'" 1"} ff"Jflm '}"~:": iilfrastructure threats and enabling
RJm ....f. fll\ trl/,111:':0J hC?"if 9'1' national and international coordination on
?"hc'} ff"J:"I.n: f("I'1 '1'1..f' such issue;
IlI}1}',.1'} fanllf .f.' he; 1111," IIClj:
}" "t,lJ~ he; '}I\?" }" "~'i.. cr. :"'} ~:,..
h}-'tLmC f'''Ifl:FA "<J/ll/,.:",~}
flll/.rhe;OJ} '''I6hA ~OJ':
UI "htT.y.<J/~~." f"J1\''''' h;J ... IIOJ ""~llY. 9/ "cryptography" means a science of coding
OJa.}. f h.}~:cO?'li} AmOJI'} '''I'}?'' data so that they cannot be read or altered
{)OJ mY.?" ("IIi} h}.~,rHIOJ mf.?" by any person or any machine other than
,.
h '}.~ y."~ I. OJ flll/.Jlfl1A r?"flm~. the intended recipient or a science of
mY.?" 1I1bt\.h:"C'~.h }"/,f. authentication and non-repudiation in the
mJ .,,'''1 RJ 'r} he; }',I\ .RJ 1,11.f. '} electronic transaction;
/\''71.:)11' {111I/.J"fl1'A I)f.'}fl ~OJ':
XI ''7'}~ OJ?" 11m'} .f.' l' :J' r'I'1I\OOJ' 10/ any expression in the masculine gender
f ....:,..}?" ),1,:,.. ;J'A : : includes the feminine.

r, 00**,,- 3, Establishment
?il f h:}~:cO?li} IlII. ... ) y'U'}',..,.. 'b~'}"" 1/ ' The Information Network Security
(hll,., II~" "lb~'}""" hr'''ll/\ r'lllm~) Agency (hereinafter the "Agency") is
r.,l ()OJ'~''''' .f 1\ OJ' ~().'} f:F1\ hereby re-established as an autonomous
r~'(~A RJ'}"/fl''''' RJfitJ' 0.''''' t1''i federal government agency having its own
nil." )" lJ' ~ h'}Y.1t; ""*"!~7.A:: legal personality.

fl.1 'b~'}""OJ' '''(flt~'I: I\m:"I\Y. trl/.~.fl'''''~, 2/ Tre Agency shall be accountable to the
Y,t1'e; A : : Prime Minister.

'PC; oo/lt,y 0.:'- 4. Head Office


rlb~'}""OJ' q,t; RJfltJ' 0.''''' II},,-'tfl }"II11 The Agency shall have its head office in
t1''i 'h'} Y. }"flL 1\ 'I. ~.,: 1If"Je;:,:OJ'?" fl'i:~ Addis Ababa, and may have branch offices
:"C}t.h l.lj: RJfltJ' 0.''''' 1\, 'i I.m f,1'''A: : elsewhere as may be necessary.
1~ 1,i'i.M@~ t ...~bA ~.:J(."" .:Jtl. n , -/1",(; 'I; ;J'Ullil ?Ni -,,"} !{j'O; (}.y" Federal Negarit Gazette No .6 2 nd January 2014 .......... .. rage 7132
t. ,,,,,, 5. Objectives
f'b~'}l'.m f~i\(11] {~h:}(;:C(l1:1i'} 'he; The objective of the Agency shall be to ensure
11~'C m"'-C'} 0'0 () I. :" J~ ~I.'i' .,= A (,: 0'0 () I. '1- that information and computer based key
A (11].y..:)"- ~~tJT,:"'} (1(11] I. :J'JIf' I\t,1t'l: infrastructures are secured, so as to be
f()i\~: {~A(I1]'1' 'he; {~.&;. 'I"ht.f"l. O'oC'/ enablers of national peace, democratization
elJnc.:}"- IT1lll..1l ""1." 'h .}-'ttY",. (11]1l;J: A and development pr~grams.
Y,tre;A ::

~. r 1a.J:1ft.fD- llA"I'}t;' .,." q C 6. Power and Duty of the Agency


'b~'}f"l.m ftl"lJH't\:" llAflr}C; ""Jllt:" The Agency shall have the powers and duties
y,C;~.:J-A: - to:
?if lJlf'e;:"e; ~c~c i\f, f,'O'IJ()I.": I I develop and implement research and study
fh:}~:ClIIJ.Ii'} 'he; 11~t:OJ"IC'} based information and computer based
I"RJ()I.1- .e ,(1.'1' "=A c,: O'IJ()I."- A (TI/,y, :)". critical infrastructure's security products
.(.r}',.r ~Cy..:)"-'} 'he; t,JAelJt\'y..:}"-'} and services;
flllJIIA1l IJe; lit i\f, 'h'}.'tmt\.
f(11] .f:I."J:
fl./ fh.'}~:ClIIJ.'Ii'} 'he; 11~'I;m""C'} 21 draft national policies, laws, standards and
I"RJ()I.,r .e ~I.'i' "=A c,: "'RJ()I." A 111] ,y, :}". strategies that enable to ensure
.(.r}',.r'} t\ 111] I. :J 1If' flTll.rll':"'t\. information and computer based key
'nlh.top' f Tt\.f"l.: fUelJ: fll:J}PrC.f.- infrastructures security, and oversight
'h C; 1l:1' to'I; if. I. 4! ~ :}"-'} f lIIJ " :J:e. :" e; their enforcement upon approval;
-AJLf.-'=r ht~(I". .,:J-:I:m'} (llmh:J-"-A:
f:/ "'RJ'}<IJll:J-tt~ 'he; f<lJA 'N':lIIJ'r t,1t-tt~ 31 support public and private institutions to
fh.'}~:ClIIJ.'li'} ~tf}','r 'he;
Tt\.f"l. formulate their own policies and standards
ll:J-'}~C,f.- 111]".p~:1'} l'h:" l\ m in compliance with the national
ff to ... :t:m T A.f"l. t;' ll:J"}Pr c: .f.' 4-C1lm' information security policy and standard
{)to i\Y, 'h '}-'t,rOJt\..f.' :Jlj: (l ...RJ{)mre; frameworks, and monitor their
t,I..~1llllJ:I:OJ'} (lmJ~fllmC: implementation;
!i/ h.'}~:clllJ.'Ii} 'he; 11~t:m""C'} 41 take all necessary counter measures to
fllJ()l.-r 1l.(1./ "=Alj: ...RJ()I.'" A 11TJy.. ":f'. defend any cyber or electromagnetic
o)f.~ llCI~y..l i\f, o)f,~ (JU,1":f'- ll., attacks on information and computer
Ane; i\f, flTll.()""~,,r'} f ... ,e(JC 'he; based infrastructures or systems or on
lbt\,h'rC'II1]<lJ~'l:h If' ,P,fl"} citizens' psychology;
t\IlJl,i\hA t,lll..i\'I. t,1l1"tt~ 'hC~;(
f ...RJOJ().f. :
f;/ (JII1]'P;: m'~ 0):"'1' f h. '}~:C:lIIJ.'li'} 'he; 51 conduct information or computer based
Il~';OJ'I'C:} mJ()I.,r ,r .(I.'i' 4=A lj~ critical infrastructures security audit at
I"RJ () 1..,. A lIIJ,y.,l'} ,(,I'}"'r ~'t,r any time and provide, for those that meet
fll1].f.'I.<lJ: "'RJfllJ"~m"} t,~~A"'m' the criteria, security standards approval
1\ 1'1'r;. ,"*IITJ'r~ f .(tr},,r --{J:p:" certificate or delegate other bodies to
lIIJl.:J1 bh}. ()C,,,lj:h,'r fl"RJllm-r O)f,tjO perform such functions;
h ,,".I'} '''''Illto'r'h '}-'t.ehe; 0"". .
I\ltt\.. :t ."*111]:" OJhA e; (lalJllm:":
~/ ,.,1~tt~ fI1tjO',;0J""C .f.'}1";: t,.(:J 61 orgamze and administer a national
9" i\ 'Ii ...RJ llbb). IITJ "h A '} (l lIIJ ~ to ~ -1' e; computer emergency responding center;
Ill) i\ f, ",1' f . . m 9" to -1' ;
X/ {J"y,(JC OJ'};P:I\":f,'} 1It'.flJh~hAe; 7/ provide assistance and support, in respect
nan an C In C 'I. Y.. 'r l\ T It fl e; I\, 1\" :f' of preventing and investigating cyber
IIU"/ flAil"} l\-"OIlI:':OJ' }',I.~-l' crimes, to police and other organs
'r,n,nc f'c,? .r.:t. ../: .r: :)c,: f't'.flJ(hn)': empowered by law;
t;/ l' :P:""} l\ t'.flJ h~ hA e; ,I, -1 :f -} }',fl." ,(,:,,0 8/ conduct digital foreinsic investigation
l\OIJflm'}"':" ctllA f'1':P:'" ol\1l O)Y.?D without physical presence or conduct
mJ~"la' e;:,:OJo ,fc'{)l\OJo II-hnt.m~. same with physical presence upon court
t-9"-COJo-fcC':i O)y,9" t'mot.-fc Ac,?,.:f warrant and in collaboration with the
~y. nC.,,:fc O)y,9" hc,:c .r.: O':fc :fctJlJ'JI police on computers or infrastructures that
II c'?OJol'I -} "AS hTl\,fl :)C (It'm-''IlIiC are purported to be attacked or sources of
II}"I'A 1It'.flJ1'f} r-'t~ :J'A (;:t.'}cth attack, to prevent attacks and provide
9"CmJ~ fOlJI.y'.r.':
early warning to citizens;
U/ f'tltT.y."/~~. 9"C-}'} he; 'JlOJOOJOC'} 9/ regulate cryptographic products and their
fmJ~/'lmC: }',i'lt.~'l.OJ"} t'.flJfl~.C:fc transaction, set necessary criteria and
1I000OJol'I-} f'}'un:P.,'9" flccFfc develop operating procedures, develop and
f'mJIIC :).}; {JhtT"'"/~~. t'mOt.,, implement cryptography infrastructure;
A OIJ-} {JOIJIIA? "Ie; fan lie; :)-}:
XI 1111.11 '}Ofl }','}"'X'
}','}"'?,' un 10/ serve as a national "Root - Certificate
f"fcy"~"",},} -fc"/Ilt-} l\OIJhe;OJ'} Authority" to perform the functions
,nc'b~lJ~ "~} oC-"c,:h,')' 11 l\flA IIr}" provided in sub article (9) of this Article;
(Jantf1 f0lJ1A 1A:
I~/ OJY.. }',1C f"'I.111e; h}',1C f' lI1/ mill' o 11/ control the import and export of
f h:U;:CD?, 'li"} 'I;ht; I\"j{p'':jo: falJt.~ information technology, information
}',~~C;~.f)J':j he; fl':P-} l;ht;I\"j{p':f sensor and information attacking
(I}',1C y".,..}~,} ~y. ft.,fflh-}ft technologies, in collaboration with
f 'Y.,lft.-}'} }"y":) ht'mh~hA }','}~C
C
concerned authorities, to prevent them
h''Y.,t'mfth;J:t:OJo }',I.~,} :J(; from posing a threat to national security;
(It'm.,,e;;P:,} fUlJ4- lmC: I'
nu ft~'}(;:CD?,'li'} 'l;ht;I\"J[
f'F..lr}Ffc 12/ build information technology testing and
C,:,fcq he; "19"101J f lY1l\"/A ll1
evaluation laboratory center;
f~'fI~.y.t OIJtJhA f'OIJ**YU;

Xr./ }',1~cr. f'fl.:rq A ~;J' alJOt.-fc A OIJ}} 13/ develop and administer national spatial
fOlJIIA? .1/e; fOlJflt-~ Y..C h '}-'tU'9" data infrastructure; and via spatial data
ffl.Tq A ~;J' OIJOllofl.y collecting technologies:
tnt; I\"J[?,':j'1 (l un m"'9":-
a) collect, analyze, store and disseminate
U) ',?C;:t!m?D }'l.W"l f'j(}.{}:rq A
onG~?J1"} (lont"!'(J(}-fh f't'm-"}."'}:
any kind of geospatial data;
(ll'?h"?r')' 'h C; (ll"'(}~{.r.l. ,). :

ft) ~;J' (I"Y.,(HJo-nn}: (J 0I/.h('?1'(I}: b) take necessary measures to mitigate


II,"/.-"",,'HH' wJ!.?D W'Y.(}t-bINJ-}' vulnerabilities and risks that could
OJ:",l I\.ht"H: f ll1l.':jt\. f F...,..}~.} occur while collecting, storing,
,fc :)~bf!>~.y.':j, ..} "AS fl :).y.':j,"}
analyzing or disseminating of the
ftt'm"'~fl }',fl~~-'. hC9"~ data;
f ODwO.r. .:
19.1 lI"fcunt.m' .r.}(JC "l\A f'nch,tcr. 14/ collect, analyze and disseminate to the
Y..lr}~} fl.')'} h'}:"fl:P{},PJ 1 IIty concerned authorities, information on
ont.~ fon(}rflf"lrfh (lOD-"'}-"'}: selected transboundary national security
l\ "y. t'ml\h-tw' }" t-aA f'a?:" GrfJ ,,}-'to?D threat activities; and provide support to
l\01';I- .,J!,1\"1' ,(~':)c,: (lUlJ{}m-l': security organs;
'l~?:l'i.n~Ij!!k.I!I.A ~.?I."" .?fl.fll <fr1'C ~ ;t-U t ,,', t!~ .,., ~jU ~.9" Federal Negarit Gazette No.6 2 nd January 2014 .. . ..... . .... page 7134

.~(;I 1',1~'1~ 1',~~ llA,..t.lOlll:':OJ 15/ develop and implement secured


h'l:"''''-:;' ~tr)~ :)':':OJ' f"'lOU": information management infrastructures
f h. '}~:CcPJ. 'Ii'} Olf),~mJ'}'r mJfll'" and systems where domestic capacity has
A Olf"'l"} "he; flC'}'" :f'} f"?UAll"}e; not yet created; charge commensurate fee
ft'mllC :J'r : "h '}-'ttJ~ t\ 1II1.,r.,.cuOJ for products and services it provides;
~C 're; t\ IIII.fllOOJ 1', 1A 'O}I\"'''''
."mJ('ltll~ h'l:.r fOlfflht.A:
16/ design and provide education and training
X~I h:}~:ccPJ.Ii'} OJY,~ t~ t:OJ"C'} programs regarding information and
tmOl'r Y~l'" UlJfll'''' A Olf'f-:; computer based critical infrastructures'
~tr}~"" lIt.r f,""~tJC''''' "he; flAlOe;
security in its own training center or In
TC'O}~'1(l:f '} UmJ~l?, U~fl
collaboration with concerned bodies;
OlfflAlOi1 Olf~hA (J)f,~ hft,I\":",
1',1'1\''''' :JC UmJ,,.llnC fmJflln''''':
I%I Ut'm'}"}fl'r OJ''')' mJfll'r I\OJ61.b 1',:JC 17/ provide' security products and services to
1',1~:" f ~tr}~'r ~C:,. "he; foreign partners upon the decision of the
1',1A ..}I\.,.. fOlf~l11; government;
Itl ',..AMOJ'} t\Olfflt.l.~ 1',fl t. 1\ 1. O'tj 18/ establish international collaboration, when
.... 1~ '}t\~ t,.,.4.'1~ ~'}~''''''} it is necessary, to implement its mission;
ft'mlf:lOC ;

xnl f'}'fll''''' faIlO"}: OJ'A 19/ own properties, enter in to contracts, sue
ft'mtp'lJ A : fl~ fmJhflfle; and be sued in its own name;
fmJhflfl :
1;I '}I\Olf OJ') t\ 0lf"1"",, fllll.lJ;. ft,1\"-:;' 20/ perform such other related activities
,,.IIOlf ~ " '''}ll~'''''''} fOlfhe; OJ'}: : conducive to the fulfillment of its
objectives.
I. f1a,:(11\m- h~~Jr1:T 7. Organization of the Agency
'b~'}""OJ': - The Agency shall have:
?iI nlo ~ 1\ f, 1111. 'I. il :,.~. filii. Ii (10. 1',') .f: 'I} e; . 1/ a Director General and, as may be
~ Y,~h"'ce; "h ,,}~1',flt.1\1. ~,,: ~h'''''A necessary, Deputy Director Generals, to
'1Je; ~J',~h"'C'-:;' ; "he; be appointed by the Prime Minister; and
!II 1',flt.I\'I. fl~''''?f-:;': 2/ the necessary staff. .
y,tj~:JA: :
~. f'PCi'm- ~.e~h"'c ilA1ll1Ci' "'GJl)C 8. Power and Duty of the Director General

?il '1)e; ~J',~h''''~. fJl.~'}""OJ '1)e; fl~


1/ The Director General shall be the chief
1',flt.~"'1. 1ft; f 'b~'}""OJ"} fl~9)1'
executive officer of the Agency and
nnl\Y. ~'r J',t'm~A: .rll'''~ .f.~A: : shall direct and administer the activities
of the Agency.
fl/ fll." h "}.,."" "}Ofl 1','}"''''' (?i)
1', 1O:P 1\ J', .f.: "} :n~ "h "} ~ ,,..lo U.,. O'C; tp e; 2/ Without limiting the generality of the
~ J',~h''''~.:- provision of sub-article (1) of this
Article, the Director General shall:
0) ell,., 1','1J~ h'}"'",' 1
f+UlJl\h,,:,.,..'} fJl.~')""OJ'} a) exercise the powers and duties of
flAI',,,} "he; ''''''ll~'r nfl~ I\J', the Agency specified under
.rOJI\A; Article 6 of this Proclamation;
N) fh.~')""(J)') t"I~"'7f>1' nUll'}"}ll,}' b) employ and administer employees
(Jt~.1l.('~ mJmJ(,Y mJt"ll."f of the Agency in accordance with
J',"'1'~A: Yll"~.(~A ; a directive approved by the
government;
'!,'{i.iitcJil;4..f.t.A " .7/.-l' .7tl.flJ cfl'rC ~ ;J'UI\i1 ?!!~ ,''' fiU fHJD Federal Negarit Gazette NO.6 2nd January 2014 ..... . .... .. . page 7135

,h) rlb~'}(lOJ'1 r,..t. TC,'''It.?D "he; c) prepare the work program and
n~:,.. .r" :)Ir t.u nt"m1 ..1,...,.. budget of the Agency and
fl.?t~'~?D n,..t. ~.eeOJ'~t.\ ; implement same upon approval
by the government;
t"m ) ft 1.. ~ '} fl. OJ' n,.. t.A' F.ft .,.. n ~ ,.,.. d) effect payments In accordance
ODIP/""" 111111 a)(J,l. ,f F.C :)A : with the approved budget of the
Agency;

IP) lIF.111 rllllF.~1" r}',t..~?t?D e) without prejudice to limitations to


1F.fl1' "h'}F.''''(fl(J''~ Iflj n"bt.lJ~ be provided for by regulation,
F.tr}'I"''''''} ft.1~ rlll/.:fA tT'I."'1'C designate profiles of the Agency's
t\.llh'} ,e,:f'~A 111\0 ftt"m1mJ''''' personnel, certain financial
?D h'"} .r ..,. fl. lj /. OJ' r lb ~ '} fl. OJ documents, equipments, methods,
r ... OJ- V,e,A TC,'1,,e,A -: r,..at ... ' work outputs and plan and
r'l""f) ... ~~1: t"m"'t.r$1':f: strategy documents as top secret
}"", t. C,' 1--: r,.. t. OJ- m. "'1' and make them inaccessible to
"h '} -'t lI'?D r "h :" .f: e; r,.. ..,.. t. '1; i( anybody when he has -reason to
... ~p,.1' 1'n~ IIIl"'1'C nl\o believe that national security will
(Jt"m ... r?D ft"'l'}"i'/OJ' ?D }"I'A be at stake upon leak;
.r
"h '}~,e. 1ft?t, F.C :)A :
/.) h,..,..,.."i'/ at1ljl' :)C (JIII/.F./. r t) represent the Agency in a1l its
r}"'j.~.,. :f 'b~}fl.OJ'} ,e,a)h~A: dealings with third parties;

... ) rlb~'}fl.OJ-'} r,..t. 1',t..~?t?D "he; g) prepare the performance and


r'l"'11 tTC ,.:f,} .f" :)IrA-: financial reports of the Agency,
ftlll/.t"mfth'OJ 1',.'A ,e4'CIlA:: and submit same to the concerned
organ.
i:1 cpc,'" ~ ,e.loh"'c;, . ftlb~}fl.OJ r,..t. 3/ The Director General may delegate part
~ t.\ l ' lJ: e; 11,.. t..ft 1 t"m Ill'} ,.. A III'} "h e; of hi~ powers and duties to other
'''''}Ilc;'} nh'{.A ftlb~}fl.OJ- 1\,1\,,-:'0, officers and employees of the Agency to
;},\.{.$1'1 "he; "'t.'~l' nOJhA e; the extent necessary for the efficient
ft . .r"'"~A lJ: ,e, l'~A : : performance of the activities of the
Agency.
ii. 111:+ 9. Budget
r lb~'}fl.OJ' n~"":-
The budget of the Agency shall be drawn
from:
11 appropriation of funds by the
government;
II 11II.1l }','I'l>: }','}"'", ~(X~,) t"m"'/.:", 2/ service fees to be collected pursuant to
' ... IU.fl m:tt\.e. OTJ, ~.fI}'c;.'} llOTJfI&,.p Yo' Article 6( 15) of this Proclamation and to
fth.\6J1(J)o OTJfI&,6OTJ.f h '}~. (J)oA be utilized, upon the approval of the
hOTJ.Y.l"1 ftl1A"1fr>'}' tJlj~f: "he; Prime Minister, for the accomplishment
i: I hl\,l\"'1' r1n. ?DUr.b -:'0, : of its mission; and
3/ other sources of revenue.

I. rylt-fJ ~~'-llT 10. Books of Accounts


iii ,b)!'} .... OJ f,.~7.t\. hS :,..hht\"1 ftf" 1/ The Agency shall keep complete and -
r'l ... fI t"ml l"1'fI''''' ,e.,e.I.lA:: accurate books of accounts.
Y./ nll.u t,1~"'~
itlf1: t.(y')('p) 2/ Without prejudice to the provision of
f~'" Y... '111m A'} y"'~"'l1ln~ 1ft; Article 8(2)(e) of this Proclamation, the
f1t.~1c"t.m f"l!MI onll"'1n:,. AC; books of accounts and financial
1111-11 'Ih {)'IP-l' nf'}ID'1: n'lu;m documents of the Agency shall be
~ .;..". c: (J) ~ '}U Ac: (), n(illite, on m audited annually by the Auditor General
~ .;. .". c: ~ on /. on /r fl. :: or by an auditor designated by him.
r./ flb~~}c"t.m f"l.ll-ll mll"'1-1I~""lj" 1~H'-I1 3/ The books of accounts and financial
'Ih ()'I P-l' nm{)'f' ~';"N-:l' documents of the Agency shall be
j!,m/.mJ/rI\.: : audited by internal auditors.
Ii. I:)-{) 'i ououty f"7l&IIj+ ilIA "', 11. Power to Issue Regulation and Directive
?if fD?,.'1.{)+C'1- sr-hc 0....,.. .eU11 t"cp~ 1/ The Council of Ministers may issue
l\07{)~Osr- flnJ. fllt.. A "I f..111 l\ .rmnl
regulation necessary for the effective
.e:f4\A::
implementation of this Proclamation.

Y./ 'b~~}fl.m .eU1 t"cpjfc; OH.U ~"}"'K' 2/ The Agency may issue directives
}Oll ~\ 1."K' (?i) IDf'lt..+ rmnUD"} necessary for the effective
f..111 l\07{lt..Osr- flnJ.fllt..A l' implementation of this Proclamation
IDIDt,,r?J:f1 l\.,rmnl .e :f'lA::
and regulation issued pursuant to sub-
article (1) of this Article.
II. fou.,.qaC "~;1- 12. Duty to Cooperate
'b~~}fl.OJ {)/.V'I'} A'i 1'''/q~~} nll.u it'lJ'; Every concerned body shall have the
mJ{)/':" n{)/r i\.f, 1\ rJ'I /.\ A~},;,l'/.\ J
obligation to cooperate with the Agency in c

f(ll/,rml\h:J':':m' t,'.i\"" frm,.qnC "'1.e..:J' exercising its powers and duties pursuant to
.r.t;C;q:r: 'I) A: : this Proclamation.

If. ,..-;r II.,


~ 13. Repealed Law

fh:}~:c;UtJ.li~} 10/.-11 Y...lr}'I"" 'b~}fI. The Information Network Security Agency


A~}Y...1'i rJcJ:cJ:(IIlJl f(ll/.~.{)"'C'l' '}Uhc n.'" Re-establishment Council of Ministers
Y...~}-II cJ~'f'C: Y.K!l/Y.7l.r. nll.u i','1)~ ~"'liZ:A:: Regulation No. 250/2011 is hereby repealed.

14. Effective Date


Ii. h'f'1f. f"'l..6'i(H 1.1t.
This Proclamation shall enter into force on the
~.U ~\lf~OkY.t-A ~;Jt,} ;JH.nl :J',}.qo'
date of publication in the Federal Negarit
hmfTIO'}' ""} ~:9"C' fOCi f,lfCjA::
Gazette.

Done at Addis Ababa, this 2nd day of January, 2014.

MlZLA TU TESHOME (DR.)

rh. +r-*~ A..t.lrl\'e .tl.,.,hlr.... ~'e PRESIDENT OF THE FEDERAL


~,..-nl\.h T~Il.tl1+ DEMOCRATIC REPUBLIC OF ETHIOPIA

S-ar putea să vă placă și