Professional Documents
Culture Documents
Introduction:
Legal education plays a crucial role in shaping the future legal professionals of a nation. In many African
countries, the legal education system still bears the remnants of the colonial era, where syllabuses and
curricula were primarily designed by former colonial powers. This article highlights the need to review
and synchronize colonial syllabuses with current jurisprudence while accommodating traditional African
legal education. By doing so, the aim is to enhance and improve the African education system and address
the problems associated with dependence on colonial education.
NO NEED TO PANIC:
The National Council for Higher Education (NCHE) of Uganda is a government agency established in 2011
under the Ministry of Education and Sports. Its primary purpose is to regulate and oversee higher
education in Uganda. The NCHE is responsible for accreditation, quality assurance, curriculum
development, research promotion, coordination, and student support. By setting standards, ensuring
quality, and fostering collaboration, the council aims to enhance the quality of higher education and
contribute to Uganda's socioeconomic development.
The University of Cambridge collaborates with the National Council for Higher Education (NCHE) in Uganda
to facilitate the admission of students into recognized programs. It is important to note that once a
program expires, students who have completed or have been enrolled in that program for more than two
years may face limitations in their academic pursuits, not only at the University of Cambridge but
potentially across Europe. The University, being responsible for managing the higher education system
throughout Europe, adheres to these regulations.
For students who have graduated from an expired program or have spent more than two years enrolled
in such a program according to the NCHE guidelines, it becomes necessary to follow the prescribed
procedures outlined by the NCHE, the Ministry of Education and Sports, and the University itself in order
to seek approval for their courses. Failure to obtain approval may render their educational transcripts
invalid, thus hindering their prospects for further education or employment in Europe. It is worth noting
that similar systems may also apply in other parts of the world, including North America.
However, it is important to clarify that the University of Cambridge is not directly responsible for the
specific procedures involved in approving expired courses or educational transcripts. These procedures
are organized by the relevant parties mentioned earlier. Consequently, it is incumbent upon the student
or their respective educational institution to coordinate and liaise with all parties involved to ensure a
successful resolution.
In light of the challenges posed by this situation, students facing these circumstances have a couple of
options to consider.
1.Firstly, they may choose to undertake a personalized, private program approval process involving the
relevant entities such as the NCHE, the educational institution offering the expired program, the Ministry
of Education and Sports, an accredited law firm, and others as required.
2.Alternatively, students may also contemplate repeating their education level by enrolling in an updated
or active course to address the issue effectively.
It is crucial for affected students to carefully consider the implications of their situation and make
informed decisions based on the available options. Proper adherence to the outlined procedures,
collaboration with the involved parties, and a proactive approach will greatly contribute to a successful
resolution.
The next page is a document from the National Council for Higher Education (NCHE) to University of
Cambridge containing a comprehensive list of expired programs offered in Uganda. This list, which was
last updated on the 20th of May, 2023, includes information on the programs that have exceeded their
validity period and the respective institutions offering them. As part of our commitment to upholding
academic standards and compliance, the University acknowledges the importance of being informed
about these expired programs in order to make informed decisions regarding admissions and educational
qualifications.
The text provides an overview of the National Council for Higher Education (NCHE) in Uganda and its role
in regulating and overseeing higher education in the country. The NCHE is responsible for various aspects
of higher education, including accreditation, quality assurance, curriculum development, research
promotion, coordination, and student support. Its aim is to enhance the quality of higher education and
contribute to Uganda's socioeconomic development.
The text also mentions the collaboration between the University of Cambridge and the NCHE in Uganda.
This collaboration facilitates the admission of students into recognized programs. It is important to note
that once a program expires, students who have completed or have been enrolled in that program for
more than two years may face limitations in their academic pursuits, not only at the University of
Cambridge but potentially across Europe. The University adheres to these regulations as it manages the
higher education system throughout Europe.
For students who have graduated from an expired program or have spent more than two years enrolled
in such a program, the text emphasizes the need to follow the prescribed procedures outlined by the
NCHE, the Ministry of Education and Sports, and the University itself in order to seek approval for their
courses. Failure to obtain approval may render their educational transcripts invalid, hindering their
prospects for further education or employment in Europe. The text also mentions that similar systems
may apply in other parts of the world, including North America.
However, it clarifies that the University of Cambridge is not directly responsible for the specific procedures
involved in approving expired courses or educational transcripts. These procedures are organized by the
relevant parties mentioned earlier. The responsibility falls on the student or their respective educational
institution to coordinate and liaise with all parties involved for a successful resolution.
In light of the challenges faced by students in this situation, the text presents two options. Firstly, students
may undertake a personalized, private program approval process involving the relevant entities such as
the NCHE, the educational institution offering the expired program, the Ministry of Education and Sports,
an accredited law firm, and others as required. Secondly, students may consider repeating their education
level by enrolling in an updated or active course to address the issue effectively.
The text emphasizes the importance of affected students carefully considering the implications of their
situation and making informed decisions based on the available options. It highlights the need for proper
adherence to the outlined procedures, collaboration with the involved parties, and a proactive approach
to achieve a successful resolution.
Finally, the text mentions that a comprehensive list of expired programs offered in Uganda is provided to
the University of Cambridge by the NCHE. This list is regularly updated and includes information on
programs that have exceeded their validity period and the respective institutions offering them. The
University acknowledges the importance of being informed about these expired programs to make
informed decisions regarding admissions and educational qualifications, demonstrating its commitment
to upholding academic standards and compliance.
Overall, the text provides a clear explanation of the role of the NCHE in Uganda, the implications of expired
programs on students' academic pursuits, the procedures involved in seeking approval, and the options
available to affected students. It emphasizes the need for careful consideration, adherence to procedures,
and collaboration with the relevant parties for a successful resolution. The mention of the University of
Cambridge's collaboration and its commitment to upholding academic standards adds credibility to the
information presented.
The text presents several important points regarding the applicability of the information in the context of
higher learning institutions in Uganda. Let's review them:
1. Role of the National Council for Higher Education (NCHE): The text highlights that the NCHE is a
government agency responsible for regulating and overseeing higher education in Uganda. It performs
functions such as accreditation, quality assurance, curriculum development, research promotion,
coordination, and student support. This information is significant as it establishes the authority and
responsibilities of the NCHE in the Ugandan higher education system.
2. Collaboration with the University of Cambridge: The text mentions a collaboration between the NCHE
and the University of Cambridge to facilitate the admission of students into recognized programs. This
collaboration indicates that the University of Cambridge recognizes the regulations and standards set by
the NCHE, implying that the NCHE's guidelines may have implications for students seeking admission to
international institutions. It emphasizes the importance of adhering to these regulations to avoid
limitations in academic pursuits, not just at Cambridge but potentially across Europe.
3. Implications of expired programs: The text states that once a program expires, students who have
completed or been enrolled in that program for more than two years may face limitations in their
academic pursuits. It is noteworthy that these limitations may not only apply to the University of
Cambridge but could also affect prospects for further education or employment in Europe and potentially
other parts of the world, including North America. This information highlights the potential consequences
of studying in expired programs and the importance of addressing the issue.
4. Procedures for seeking approval: The text emphasizes that students who have graduated from an
expired program or have spent more than two years enrolled in such a program need to follow prescribed
procedures outlined by the NCHE, the Ministry of Education and Sports, and the University itself. These
procedures need to be coordinated with all parties involved to obtain approval for their courses. Failure
to obtain approval may render educational transcripts invalid. This information underscores the necessity
of following the established procedures to ensure the validity of educational qualifications.
5. Options for affected students: The text presents two options for students facing the issue of expired
programs. Firstly, they can undertake a personalized, private program approval process involving the
relevant entities such as the NCHE, the educational institution offering the expired program, the Ministry
of Education and Sports, an accredited law firm, and others as required. Secondly, they may consider
repeating their education level by enrolling in an updated or active course. These options provide
potential paths for students to address the issue effectively.
6. Considerations and proactive approach: The text emphasizes that affected students should carefully
consider the implications of their situation and make informed decisions based on the available options.
It highlights the importance of proper adherence to procedures, collaboration with the involved parties,
and a proactive approach to resolve the issue successfully. This information encourages students to take
responsibility and actively engage in the process to secure a favorable outcome.
7. Availability of a comprehensive list of expired programs: The text mentions that the NCHE provides the
University of Cambridge with a comprehensive list of expired programs offered in Uganda. This list is
regularly updated and contains information about the programs that have exceeded their validity period
and the institutions offering them. This demonstrates the commitment of both the NCHE and the
University of Cambridge to upholding academic standards and compliance.
In conclusion, the text raises several crucial points regarding the applicability of the information to higher
learning institutions in Uganda. It highlights the role of the NCHE, the implications of expired programs,
the procedures for seeking approval, available options for affected students, the importance of careful
consideration and proactive approach, and the provision of a comprehensive list of expired programs.
These points provide valuable insights for higher learning institutions in Uganda to navigate issues related
to expired programs and maintain academic standards.
8. Regulatory framework: The text establishes that the National Council for Higher Education (NCHE)
operates within a regulatory framework set by the Ministry of Education and Sports. This indicates that
the NCHE's activities and guidelines align with the broader regulations and policies of the Ugandan
government. It underscores the legal basis and authority of the NCHE in overseeing higher education in
the country.
9. Validity period of programs: The text mentions that programs have a validity period, and once they
expire, students may face limitations. This information highlights the importance of being aware of
program expiration dates to ensure timely completion and avoid potential complications in the future. It
emphasizes the need for students to monitor the validity of their chosen programs and plan their
academic journeys accordingly.
10. Collaboration with other institutions: While the text specifically mentions the collaboration between
the NCHE and the University of Cambridge, it also indicates that similar systems and regulations may apply
in other parts of the world, including North America. This suggests that students and educational
institutions outside of Europe and Uganda should also be mindful of program expiration and the potential
impact on their educational qualifications.
11. Role of educational institutions: The text clarifies that the University of Cambridge, or any other
international institution, is not directly responsible for the approval procedures of expired programs or
educational transcripts. It emphasizes that it is the responsibility of the student or their respective
educational institution to coordinate and liaise with the relevant parties. This information highlights the
need for students and their institutions to take an active role in resolving issues related to expired
programs.
12. Importance of informed decisions: The text emphasizes the significance of affected students making
informed decisions based on the available options. It underscores the need for careful consideration of
the implications and potential consequences of their situation. This information stresses the importance
of thorough research, seeking advice from relevant authorities, and understanding the potential
outcomes before deciding on a course of action.
13. Compliance with academic standards: The text indicates that the University of Cambridge
acknowledges the importance of being informed about expired programs to uphold academic standards
and compliance. This demonstrates the commitment of the University to ensure that admissions and
educational qualifications meet the required standards. It highlights the broader importance of
maintaining academic integrity and adhering to recognized standards in higher education.
These additional points further contribute to the understanding of the implications, responsibilities, and
considerations related to expired programs and the collaborative efforts required between students,
educational institutions, and regulatory bodies to address such issues effectively.
The specific practice of setting validity periods for programs and the associated consequences for students
who have completed or been enrolled in expired programs may vary from country to country. While the
text mentions that similar systems may apply in other parts of the world, including North America, it does
not provide specific details about the prevalence or exact practices in different regions.
It is important to note that educational systems and regulations vary significantly across countries and
even within regions. Each country or jurisdiction may have its own policies and procedures regarding
program validity, accreditation, and recognition of qualifications. Therefore, it is essential for students
and educational institutions to familiarize themselves with the specific regulations and guidelines in their
respective countries or the countries where they seek to pursue further education or employment.
To gain a comprehensive understanding of common practices worldwide, it would be advisable to
research and consult resources specific to the desired region or countries of interest. This may include
exploring government websites, educational authorities, or international credential evaluation services
that provide information on academic recognition and the acceptance of qualifications from different
educational systems.
In summary, while the concept of program expiration and its impact on educational qualifications may
exist in various countries, it is crucial to conduct country-specific research to determine the common
practices and regulations in the specific region of interest.
Based on the information provided in the text, it appears that the National Council for Higher Education
(NCHE) of Uganda does not explicitly state that Ugandan universities or higher institutions licensed by
them are outdated or expired. Instead, the text suggests that the issue arises when students have
completed or been enrolled in specific programs offered by these institutions that have exceeded their
validity period.
The collaboration between the NCHE and the University of Cambridge, as mentioned in the text, pertains
to the admission of students into recognized programs. It is important to note that the University of
Cambridge, as an internationally renowned institution, may have its own standards and recognition
criteria for programs from different countries.
While the text does not provide specific examples, it implies that the University of Cambridge, being
responsible for managing the higher education system throughout Europe, adheres to certain regulations
and standards. If a program offered by a Ugandan institution is considered expired or not recognized by
the University of Cambridge or other European institutions, it may result in limitations for students
seeking admission to those institutions.
It is worth mentioning that the recognition and acceptance of qualifications from different educational
institutions vary across countries and institutions. The University of Cambridge, or any other international
institution, may have its own criteria for evaluating and accepting qualifications from foreign institutions.
These criteria may consider factors such as accreditation, program quality, curriculum alignment, and
other relevant indicators.
To provide specific examples, one could consider the scenario where a student from a Ugandan institution
completed a program that is recognized and accredited by the NCHE within Uganda. In this case, the
qualification may hold value within Uganda and be acceptable for further education or employment
opportunities within the country. However, if the same student seeks admission to the University of
Cambridge or another European institution, the program's expiration or lack of recognition by the
University of Cambridge may pose challenges, and the student may need to follow additional procedures
or pursue alternative pathways for admission.
It is important to consult official sources, such as the NCHE and the University of Cambridge, or seek
guidance from educational authorities or international credential evaluation services for detailed and
accurate information on specific recognition criteria and the acceptance of qualifications from Ugandan
institutions by international universities.
Colonial syllabuses often fail to keep pace with contemporary legal developments, including shifts in
jurisprudential theories and emerging legal issues. Reviewing and updating the curricula ensures that law
students are equipped with the necessary knowledge and skills to navigate modern legal challenges. This
includes incorporating recent court decisions, legislative developments, and international legal
obligations into the syllabus.
While it is crucial to stay updated with global legal trends, it is equally important to recognize and
accommodate the rich and diverse African legal traditions and practices. Integrating traditional African
legal education into the syllabus can help foster a more inclusive and culturally sensitive legal system. It
enables students to appreciate the unique legal perspectives, customary laws, and indigenous dispute
resolution mechanisms that form an integral part of Africa's legal heritage.
Africa is a continent with diverse legal systems, including both formal statutory laws and customary laws.
Embracing legal pluralism in the law school syllabuses recognizes and acknowledges the coexistence of
multiple legal frameworks. By incorporating elements of both common law and African customary law,
law schools can produce graduates who are well-versed in both systems, enhancing their ability to serve
diverse communities and contribute to the development of the legal profession.
Reviewing and synchronizing colonial syllabuses with current jurisprudence provides an opportunity to
foster critical thinking and legal innovation. By encouraging students to question established legal
principles, engage in comparative legal studies, and analyze legal frameworks critically, law schools can
nurture a generation of legal professionals who are not bound by rigid dogmas but are capable of adapting
to the evolving legal landscape.
Reviewing colonial syllabuses in law schools for LLB programs is a crucial step towards enhancing and
bettering the African education system. Synchronizing them with current jurisprudence while
accommodating traditional African legal education fosters a more comprehensive, inclusive, and culturally
sensitive legal education. By addressing the problem of African countries depending solely on colonial
education systems, law schools can produce graduates who are better prepared to navigate the
complexities of contemporary legal issues, serve their communities, and contribute to the development
of a robust African legal system.
6. Advancing Indigenous Legal Systems: Incorporating traditional African legal education into law school
syllabuses not only acknowledges the importance of indigenous legal systems but also provides an
opportunity to revitalize and preserve these systems. By studying and understanding traditional African
legal principles, law students can contribute to the revitalization and recognition of indigenous legal
systems, ensuring their continued relevance and protection.
7. Empowering Local Legal Professionals: Reviewing colonial syllabuses and incorporating traditional
African legal education can help empower local legal professionals to address the unique legal challenges
faced by their communities. By equipping them with the knowledge and skills grounded in local legal
traditions, law schools can produce graduates who are better positioned to serve as advocates, mediators,
and legal advisors within their own cultural contexts.
8. Enhancing Legal Research and Development: Updating and synchronizing syllabuses with current
jurisprudence encourages legal research and development within African countries. It creates
opportunities for scholars and practitioners to engage in cutting-edge legal research, contribute to legal
scholarship, and develop innovative legal solutions that are contextually relevant to the African continent.
9. Promoting Social and Economic Development: By incorporating aspects of traditional African legal
education into law school curricula, students can gain a broader understanding of the social, economic,
and historical contexts that shape legal systems in Africa. This holistic approach to legal education can
contribute to the development of well-rounded legal professionals who are not only skilled in legal
analysis but also equipped to address broader social and economic issues affecting their communities.
10. Encouraging Legal Innovation and Adaptation: Reviewing colonial syllabuses provides an opportunity
to encourage legal innovation and adaptability. By recognizing the limitations of outdated curricula and
embracing emerging legal trends, law schools can foster a culture of innovation, critical thinking, and
problem-solving among students. This prepares them to navigate the evolving legal landscape and
respond effectively to emerging legal challenges.
11. Promoting Global Perspectives: While the focus is on incorporating traditional African legal education,
it is equally important to maintain a global perspective. Law schools can strike a balance by exposing
students to comparative legal studies, international legal frameworks, and diverse legal traditions from
around the world. This promotes a global outlook among law students, enabling them to engage in
international legal practice and contribute to global legal discussions.
By reviewing colonial syllabuses, integrating traditional African legal education, and addressing the
problems associated with dependence on colonial education, law schools can play a vital role in shaping
a legal education system that is responsive, inclusive, and aligned with the needs of African societies.
12. Decolonizing Legal Education: Reviewing colonial syllabuses is part of a broader effort to decolonize
legal education. It aims to challenge the Eurocentric perspectives and biases that have historically
dominated legal curricula. By incorporating diverse voices, perspectives, and legal traditions, law schools
can create a more inclusive and representative educational experience.
13. Cultivating Cultural Competence: Adapting legal education to include traditional African legal
education fosters cultural competence among law students. It equips them with a deeper understanding
and appreciation of the legal systems and customs that shape African societies. This cultural competence
is essential for lawyers to effectively engage with clients, navigate cross-cultural legal issues, and promote
social justice.
14. Encouraging Local Legal Scholarship: The review of colonial syllabuses encourages the development
of local legal scholarship and academic research. By incorporating traditional African legal education, law
schools can stimulate research and discourse on indigenous legal principles, legal pluralism, and the
intersection between customary and statutory laws. This contributes to the growth of African legal
scholarship and enriches the global legal community.
15. Strengthening Legal Systems: A comprehensive review of colonial syllabuses can help identify gaps
and weaknesses in the existing legal systems. By updating the syllabuses to reflect current legal
developments and needs, law schools can contribute to the improvement and modernization of African
legal systems. This, in turn, enhances access to justice, the rule of law, and the overall effectiveness of
legal institutions.
16. Fostering Social Justice and Human Rights: By incorporating contemporary human rights standards
and social justice issues into the syllabuses, law schools can promote a values-based legal education. This
empowers law students to become advocates for justice, equality, and human rights within their
communities. It also equips them with the tools to challenge systemic injustices and contribute to positive
societal change.
17. Building African Legal Expertise: Reviewing colonial syllabuses and incorporating traditional African
legal education helps develop a pool of legal professionals with expertise in African legal systems. This
reduces the reliance on foreign legal consultants or experts and enables African countries to address legal
challenges and develop sustainable legal solutions independently.
18. Enhancing Legal Harmonization: Synchronizing colonial syllabuses with current jurisprudence
promotes legal harmonization within Africa. By aligning legal education across countries and regions, law
schools can contribute to the development of a cohesive legal framework, making it easier for legal
professionals to collaborate and foster regional integration.
In summary, the review of colonial syllabuses in law schools for LLB programs is essential for decolonizing
legal education, fostering cultural competence, strengthening legal systems, promoting social justice, and
building African legal expertise. By embracing traditional African legal education and synchronizing with
current jurisprudence, law schools can create a more inclusive, relevant, and impactful legal education
system for the benefit of African societies and the advancement of the legal profession.
SOME OF THE COURSES THAT NEED IMPLEMENTATION COULD BE
Kindly note at suigeneris we have written on almost all of the above and below are samples of course
descriptor that may help law faculties in Uganda to start such programs. Find all our books at
www.lubogo.org and www.suigenerislawapp.com
Title: THE IMPORTANCE OF REVIEWING COLONIAL SYLLABUSES IN LAW
SCHOOLS FOR LLB PROGRAMS
Introduction:
Legal education plays a crucial role in shaping the future legal professionals of a nation. In many African
countries, the legal education system still bears the remnants of the colonial era, where syllabuses and
curricula were primarily designed by former colonial powers. This article highlights the need to review
and synchronize colonial syllabuses with current jurisprudence while accommodating traditional African
legal education. By doing so, the aim is to enhance and improve the African education system and address
the problems associated with dependence on colonial education.
NO NEED TO PANIC:
The National Council for Higher Education (NCHE) of Uganda is a government agency established in 2011
under the Ministry of Education and Sports. Its primary purpose is to regulate and oversee higher
education in Uganda. The NCHE is responsible for accreditation, quality assurance, curriculum
development, research promotion, coordination, and student support. By setting standards, ensuring
quality, and fostering collaboration, the council aims to enhance the quality of higher education and
contribute to Uganda's socioeconomic development.
The University of Cambridge collaborates with the National Council for Higher Education (NCHE) in Uganda
to facilitate the admission of students into recognized programs. It is important to note that once Ă
ƉƌŽŐƌĂŵĞdžƉŝƌĞƐ͕ƐƚƵĚĞŶƚƐǁŚŽŚĂǀĞĐŽŵƉůĞƚĞĚŽƌŚĂǀĞďĞĞŶĞŶƌŽůůĞĚŝŶƚŚĂƚƉƌŽŐƌĂŵĨŽƌŵŽƌĞƚŚĂŶƚǁŽ
LJĞĂƌƐ ŵĂLJ ĨĂĐĞ ůŝŵŝƚĂƚŝŽŶƐ ŝŶ ƚŚĞŝƌ ĂĐĂĚĞŵŝĐ ƉƵƌƐƵŝƚƐ͕ not only at the University of Cambridge but
potentially across Europe. The University, being responsible for managing the higher education system
throughout Europe, adheres to these regulations.
For students who have graduated from an expired program or have spent more than two years enrolled
in such a program according to the NCHE guidelines, it becomes necessary to follow the prescribed
procedures outlined by the NCHE, the Ministry of Education and Sports, and the University itself in order
to seek approval for their courses. Failure to obtain approval mayƌĞŶĚĞƌƚŚĞŝƌĞĚƵĐĂƚŝŽŶĂůƚƌĂŶƐĐƌŝƉƚƐ
ŝŶǀĂůŝĚ͕ƚŚƵƐŚŝŶĚĞƌŝŶŐƚŚĞŝƌƉƌŽƐƉĞĐƚƐĨŽƌĨƵƌƚŚĞƌĞĚƵĐĂƚŝŽŶŽƌĞŵƉůŽLJŵĞŶƚ in Europe. It is worth noting
that similar systems may also apply in other parts of the world, including North America.
However, it is important to clarify that the University of Cambridge is not directly responsible for the
specific procedures involved in approving expired courses or educational transcripts. These procedures
are organized by the relevant parties mentioned earlier. Consequently, it is incumbent upon the student
or their respective educational institution to coordinate and liaise with all parties involved to ensure a
successful resolution.
In light of the challenges posed by this situation, students facing these circumstances have a couple of
options to consider.
1.Firstly, they may choose to undertake a personalized, private program approval process involving the
relevant entities such as the NCHE, the educational institution offering the expired program, the Ministry
of Education and Sports, an accredited law firm, and others as required.
2.Alternatively, students may also contemplate repeating their education level by enrolling in an updated
or active course to address the issue effectively.
It is crucial for affected students to carefully consider the implications of their situation and make
informed decisions based on the available options. Proper adherence to the outlined procedures,
collaboration with the involved parties, and a proactive approach will greatly contribute to a successful
resolution.
The next page is a document from the National Council for Higher Education (NCHE) to University of
Cambridge containing a comprehensive list of expired programs offered in Uganda. This list, which was
last updated on the 20th of May, 2023, includes information on the programs that have exceeded their
validity period and the respective institutions offering them. As part of our commitment to upholding
academic standards and compliance, the University acknowledges the importance of being informed
about these expired programs in order to make informed decisions regarding admissions and educational
qualifications.
The text provides an overview of the National Council for Higher Education (NCHE) in Uganda and its role
in regulating and overseeing higher education in the country. The NCHE is responsible for various aspects
of higher education, including accreditation, quality assurance, curriculum development, research
promotion, coordination, and student support. Its aim is to enhance the quality of higher education and
contribute to Uganda's socioeconomic development.
The text also mentions the collaboration between the University of Cambridge and the NCHE in Uganda.
This collaboration facilitates the admission of students into recognized programs. It is important to note
that once a program expires, students who have completed or have been enrolled in that program for
more than two years may face limitations in their academic pursuits, not only at the University of
Cambridge but potentially across Europe. The University adheres to these regulations as it manages the
higher education system throughout Europe.
For students who have graduated from an expired program or have spent more than two years enrolled
in such a program, the text emphasizes the need to follow the prescribed procedures outlined by the
NCHE, the Ministry of Education and Sports, and the University itself in order to seek approval for their
courses. Failure to obtain approval may render their educational transcripts invalid, hindering their
prospects for further education or employment in Europe. The text also mentions that similar systems
may apply in other parts of the world, including North America.
However, it clarifies that the University of Cambridge is not directly responsible for the specific procedures
involved in approving expired courses or educational transcripts. These procedures are organized by the
relevant parties mentioned earlier. The responsibility falls on the student or their respective educational
institution to coordinate and liaise with all parties involved for a successful resolution.
In light of the challenges faced by students in this situation, the text presents two options. Firstly, students
may undertake a personalized, private program approval process involving the relevant entities such as
the NCHE, the educational institution offering the expired program, the Ministry of Education and Sports,
an accredited law firm, and others as required. Secondly, students may consider repeating their education
level by enrolling in an updated or active course to address the issue effectively.
The text emphasizes the importance of affected students carefully considering the implications of their
situation and making informed decisions based on the available options. It highlights the need for proper
adherence to the outlined procedures, collaboration with the involved parties, and a proactive approach
to achieve a successful resolution.
Finally, the text mentions that a comprehensive list of expired programs offered in Uganda is provided to
the University of Cambridge by the NCHE. This list is regularly updated and includes information on
programs that have exceeded their validity period and the respective institutions offering them. The
University acknowledges the importance of being informed about these expired programs to make
informed decisions regarding admissions and educational qualifications, demonstrating its commitment
to upholding academic standards and compliance.
Overall, the text provides a clear explanation of the role of the NCHE in Uganda, the implications of expired
programs on students' academic pursuits, the procedures involved in seeking approval, and the options
available to affected students. It emphasizes the need for careful consideration, adherence to procedures,
and collaboration with the relevant parties for a successful resolution. The mention of the University of
Cambridge's collaboration and its commitment to upholding academic standards adds credibility to the
information presented.
The text presents several important points regarding the applicability of the information in the context of
higher learning institutions in Uganda. Let's review them:
1. Role of the National Council for Higher Education (NCHE): The text highlights that the NCHE is a
government agency responsible for regulating and overseeing higher education in Uganda. It performs
functions such as accreditation, quality assurance, curriculum development, research promotion,
coordination, and student support. This information is significant as it establishes the authority and
responsibilities of the NCHE in the Ugandan higher education system.
2. Collaboration with the University of Cambridge: The text mentions a collaboration between the NCHE
and the University of Cambridge to facilitate the admission of students into recognized programs. This
collaboration indicates that the University of Cambridge recognizes the regulations and standards set by
the NCHE, implying that the NCHE's guidelines may have implications for students seeking admission to
international institutions. It emphasizes the importance of adhering to these regulations to avoid
limitations in academic pursuits, not just at Cambridge but potentially across Europe.
3. Implications of expired programs: The text states that once a program expires, students who have
completed or been enrolled in that program for more than two years may face limitations in their
academic pursuits. It is noteworthy that these limitations may not only apply to the University of
Cambridge but could also affect prospects for further education or employment in Europe and potentially
other parts of the world, including North America. This information highlights the potential consequences
of studying in expired programs and the importance of addressing the issue.
4. Procedures for seeking approval: The text emphasizes that students who have graduated from an
expired program or have spent more than two years enrolled in such a program need to follow prescribed
procedures outlined by the NCHE, the Ministry of Education and Sports, and the University itself. These
procedures need to be coordinated with all parties involved to obtain approval for their courses. Failure
to obtain approval may render educational transcripts invalid. This information underscores the necessity
of following the established procedures to ensure the validity of educational qualifications.
5. Options for affected students: The text presents two options for students facing the issue of expired
programs. Firstly, they can undertake a personalized, private program approval process involving the
relevant entities such as the NCHE, the educational institution offering the expired program, the Ministry
of Education and Sports, an accredited law firm, and others as required. Secondly, they may consider
repeating their education level by enrolling in an updated or active course. These options provide
potential paths for students to address the issue effectively.
6. Considerations and proactive approach: The text emphasizes that affected students should carefully
consider the implications of their situation and make informed decisions based on the available options.
It highlights the importance of proper adherence to procedures, collaboration with the involved parties,
and a proactive approach to resolve the issue successfully. This information encourages students to take
responsibility and actively engage in the process to secure a favorable outcome.
7. Availability of a comprehensive list of expired programs: The text mentions that the NCHE provides the
University of Cambridge with a comprehensive list of expired programs offered in Uganda. This list is
regularly updated and contains information about the programs that have exceeded their validity period
and the institutions offering them. This demonstrates the commitment of both the NCHE and the
University of Cambridge to upholding academic standards and compliance.
In conclusion, the text raises several crucial points regarding the applicability of the information to higher
learning institutions in Uganda. It highlights the role of the NCHE, the implications of expired programs,
the procedures for seeking approval, available options for affected students, the importance of careful
consideration and proactive approach, and the provision of a comprehensive list of expired programs.
These points provide valuable insights for higher learning institutions in Uganda to navigate issues related
to expired programs and maintain academic standards.
8. Regulatory framework: The text establishes that the National Council for Higher Education (NCHE)
operates within a regulatory framework set by the Ministry of Education and Sports. This indicates that
the NCHE's activities and guidelines align with the broader regulations and policies of the Ugandan
government. It underscores the legal basis and authority of the NCHE in overseeing higher education in
the country.
9. Validity period of programs: The text mentions that programs have a validity period, and once they
expire, students may face limitations. This information highlights the importance of being aware of
program expiration dates to ensure timely completion and avoid potential complications in the future. It
emphasizes the need for students to monitor the validity of their chosen programs and plan their
academic journeys accordingly.
10. Collaboration with other institutions: While the text specifically mentions the collaboration between
the NCHE and the University of Cambridge, it also indicates that similar systems and regulations may apply
in other parts of the world, including North America. This suggests that students and educational
institutions outside of Europe and Uganda should also be mindful of program expiration and the potential
impact on their educational qualifications.
11. Role of educational institutions: The text clarifies that the University of Cambridge, or any other
international institution, is not directly responsible for the approval procedures of expired programs or
educational transcripts. It emphasizes that it is the responsibility of the student or their respective
educational institution to coordinate and liaise with the relevant parties. This information highlights the
need for students and their institutions to take an active role in resolving issues related to expired
programs.
12. Importance of informed decisions: The text emphasizes the significance of affected students making
informed decisions based on the available options. It underscores the need for careful consideration of
the implications and potential consequences of their situation. This information stresses the importance
of thorough research, seeking advice from relevant authorities, and understanding the potential
outcomes before deciding on a course of action.
13. Compliance with academic standards: The text indicates that the University of Cambridge
acknowledges the importance of being informed about expired programs to uphold academic standards
and compliance. This demonstrates the commitment of the University to ensure that admissions and
educational qualifications meet the required standards. It highlights the broader importance of
maintaining academic integrity and adhering to recognized standards in higher education.
These additional points further contribute to the understanding of the implications, responsibilities, and
considerations related to expired programs and the collaborative efforts required between students,
educational institutions, and regulatory bodies to address such issues effectively.
The specific practice of setting validity periods for programs and the associated consequences for students
who have completed or been enrolled in expired programs may vary from country to country. While the
text mentions that similar systems may apply in other parts of the world, including North America, it does
not provide specific details about the prevalence or exact practices in different regions.
It is important to note that educational systems and regulations vary significantly across countries and
even within regions. Each country or jurisdiction may have its own policies and procedures regarding
program validity, accreditation, and recognition of qualifications. Therefore, it is essential for students
and educational institutions to familiarize themselves with the specific regulations and guidelines in their
respective countries or the countries where they seek to pursue further education or employment.
To gain a comprehensive understanding of common practices worldwide, it would be advisable to
research and consult resources specific to the desired region or countries of interest. This may include
exploring government websites, educational authorities, or international credential evaluation services
that provide information on academic recognition and the acceptance of qualifications from different
educational systems.
In summary, while the concept of program expiration and its impact on educational qualifications may
exist in various countries, it is crucial to conduct country-specific research to determine the common
practices and regulations in the specific region of interest.
Based on the information provided in the text, it appears that the National Council for Higher Education
(NCHE) of Uganda does not explicitly state that Ugandan universities or higher institutions licensed by
them are outdated or expired. Instead, the text suggests that the issue arises when students have
completed or been enrolled in specific programs offered by these institutions that have exceeded their
validity period.
The collaboration between the NCHE and the University of Cambridge, as mentioned in the text, pertains
to the admission of students into recognized programs. It is important to note that the University of
Cambridge, as an internationally renowned institution, may have its own standards and recognition
criteria for programs from different countries.
While the text does not provide specific examples, it implies that the University of Cambridge, being
responsible for managing the higher education system throughout Europe, adheres to certain regulations
and standards. If a program offered by a Ugandan institution is considered expired or not recognized by
the University of Cambridge or other European institutions, it may result in limitations for students
seeking admission to those institutions.
It is worth mentioning that the recognition and acceptance of qualifications from different educational
institutions vary across countries and institutions. The University of Cambridge, or any other international
institution, may have its own criteria for evaluating and accepting qualifications from foreign institutions.
These criteria may consider factors such as accreditation, program quality, curriculum alignment, and
other relevant indicators.
To provide specific examples, one could consider the scenario where a student from a Ugandan institution
completed a program that is recognized and accredited by the NCHE within Uganda. In this case, the
qualification may hold value within Uganda and be acceptable for further education or employment
opportunities within the country. However, if the same student seeks admission to the University of
Cambridge or another European institution, the program's expiration or lack of recognition by the
University of Cambridge may pose challenges, and the student may need to follow additional procedures
or pursue alternative pathways for admission.
It is important to consult official sources, such as the NCHE and the University of Cambridge, or seek
guidance from educational authorities or international credential evaluation services for detailed and
accurate information on specific recognition criteria and the acceptance of qualifications from Ugandan
institutions by international universities.
Colonial syllabuses often fail to keep pace with contemporary legal developments, including shifts in
jurisprudential theories and emerging legal issues. Reviewing and updating the curricula ensures that law
students are equipped with the necessary knowledge and skills to navigate modern legal challenges. This
includes incorporating recent court decisions, legislative developments, and international legal
obligations into the syllabus.
While it is crucial to stay updated with global legal trends, it is equally important to recognize and
accommodate the rich and diverse African legal traditions and practices. Integrating traditional African
legal education into the syllabus can help foster a more inclusive and culturally sensitive legal system. It
enables students to appreciate the unique legal perspectives, customary laws, and indigenous dispute
resolution mechanisms that form an integral part of Africa's legal heritage.
Africa is a continent with diverse legal systems, including both formal statutory laws and customary laws.
Embracing legal pluralism in the law school syllabuses recognizes and acknowledges the coexistence of
multiple legal frameworks. By incorporating elements of both common law and African customary law,
law schools can produce graduates who are well-versed in both systems, enhancing their ability to serve
diverse communities and contribute to the development of the legal profession.
Reviewing and synchronizing colonial syllabuses with current jurisprudence provides an opportunity to
foster critical thinking and legal innovation. By encouraging students to question established legal
principles, engage in comparative legal studies, and analyze legal frameworks critically, law schools can
nurture a generation of legal professionals who are not bound by rigid dogmas but are capable of adapting
to the evolving legal landscape.
Reviewing colonial syllabuses in law schools for LLB programs is a crucial step towards enhancing and
bettering the African education system. Synchronizing them with current jurisprudence while
accommodating traditional African legal education fosters a more comprehensive, inclusive, and culturally
sensitive legal education. By addressing the problem of African countries depending solely on colonial
education systems, law schools can produce graduates who are better prepared to navigate the
complexities of contemporary legal issues, serve their communities, and contribute to the development
of a robust African legal system.
6. Advancing Indigenous Legal Systems: Incorporating traditional African legal education into law school
syllabuses not only acknowledges the importance of indigenous legal systems but also provides an
opportunity to revitalize and preserve these systems. By studying and understanding traditional African
legal principles, law students can contribute to the revitalization and recognition of indigenous legal
systems, ensuring their continued relevance and protection.
7. Empowering Local Legal Professionals: Reviewing colonial syllabuses and incorporating traditional
African legal education can help empower local legal professionals to address the unique legal challenges
faced by their communities. By equipping them with the knowledge and skills grounded in local legal
traditions, law schools can produce graduates who are better positioned to serve as advocates, mediators,
and legal advisors within their own cultural contexts.
8. Enhancing Legal Research and Development: Updating and synchronizing syllabuses with current
jurisprudence encourages legal research and development within African countries. It creates
opportunities for scholars and practitioners to engage in cutting-edge legal research, contribute to legal
scholarship, and develop innovative legal solutions that are contextually relevant to the African continent.
9. Promoting Social and Economic Development: By incorporating aspects of traditional African legal
education into law school curricula, students can gain a broader understanding of the social, economic,
and historical contexts that shape legal systems in Africa. This holistic approach to legal education can
contribute to the development of well-rounded legal professionals who are not only skilled in legal
analysis but also equipped to address broader social and economic issues affecting their communities.
10. Encouraging Legal Innovation and Adaptation: Reviewing colonial syllabuses provides an opportunity
to encourage legal innovation and adaptability. By recognizing the limitations of outdated curricula and
embracing emerging legal trends, law schools can foster a culture of innovation, critical thinking, and
problem-solving among students. This prepares them to navigate the evolving legal landscape and
respond effectively to emerging legal challenges.
11. Promoting Global Perspectives: While the focus is on incorporating traditional African legal education,
it is equally important to maintain a global perspective. Law schools can strike a balance by exposing
students to comparative legal studies, international legal frameworks, and diverse legal traditions from
around the world. This promotes a global outlook among law students, enabling them to engage in
international legal practice and contribute to global legal discussions.
By reviewing colonial syllabuses, integrating traditional African legal education, and addressing the
problems associated with dependence on colonial education, law schools can play a vital role in shaping
a legal education system that is responsive, inclusive, and aligned with the needs of African societies.
12. Decolonizing Legal Education: Reviewing colonial syllabuses is part of a broader effort to decolonize
legal education. It aims to challenge the Eurocentric perspectives and biases that have historically
dominated legal curricula. By incorporating diverse voices, perspectives, and legal traditions, law schools
can create a more inclusive and representative educational experience.
13. Cultivating Cultural Competence: Adapting legal education to include traditional African legal
education fosters cultural competence among law students. It equips them with a deeper understanding
and appreciation of the legal systems and customs that shape African societies. This cultural competence
is essential for lawyers to effectively engage with clients, navigate cross-cultural legal issues, and promote
social justice.
14. Encouraging Local Legal Scholarship: The review of colonial syllabuses encourages the development
of local legal scholarship and academic research. By incorporating traditional African legal education, law
schools can stimulate research and discourse on indigenous legal principles, legal pluralism, and the
intersection between customary and statutory laws. This contributes to the growth of African legal
scholarship and enriches the global legal community.
15. Strengthening Legal Systems: A comprehensive review of colonial syllabuses can help identify gaps
and weaknesses in the existing legal systems. By updating the syllabuses to reflect current legal
developments and needs, law schools can contribute to the improvement and modernization of African
legal systems. This, in turn, enhances access to justice, the rule of law, and the overall effectiveness of
legal institutions.
16. Fostering Social Justice and Human Rights: By incorporating contemporary human rights standards
and social justice issues into the syllabuses, law schools can promote a values-based legal education. This
empowers law students to become advocates for justice, equality, and human rights within their
communities. It also equips them with the tools to challenge systemic injustices and contribute to positive
societal change.
17. Building African Legal Expertise: Reviewing colonial syllabuses and incorporating traditional African
legal education helps develop a pool of legal professionals with expertise in African legal systems. This
reduces the reliance on foreign legal consultants or experts and enables African countries to address legal
challenges and develop sustainable legal solutions independently.
18. Enhancing Legal Harmonization: Synchronizing colonial syllabuses with current jurisprudence
promotes legal harmonization within Africa. By aligning legal education across countries and regions, law
schools can contribute to the development of a cohesive legal framework, making it easier for legal
professionals to collaborate and foster regional integration.
In summary, the review of colonial syllabuses in law schools for LLB programs is essential for decolonizing
legal education, fostering cultural competence, strengthening legal systems, promoting social justice, and
building African legal expertise. By embracing traditional African legal education and synchronizing with
current jurisprudence, law schools can create a more inclusive, relevant, and impactful legal education
system for the benefit of African societies and the advancement of the legal profession.
SOME OF THE COURSES THAT NEED IMPLEMENTATION COULD BE
Kindly note at suigeneris we have written on almost all of the above and below are samples of course
descriptor that may help law faculties in Uganda to start such programs. Find all our books at
www.lubogo.org and www.suigenerislawapp.com
COURSE DESCRIPTER FOR
CYBER LAW
BY ISAAC LUBOGO CHRISTOPHER
TABLE OF CONTENTS
0DLQFRQWHQW
Cyber law covers a fairly broad area, encompassing several subtopics including freedom of
expression, access to and usage of the Internet, and online privacy. Generically, cyber law has
been referred to as the Law of the Internet. Information technology law provides the legal
framework for collecting, storing, and disseminating electronic information in the global
marketplace. Hence, Cyber law can be considered as a part of the overall legal system that deals
with the Internet, E-commerce, digital contracts, electronic evidence, cyberspace, and their
respective legal issues.
&RQFOXVLRQ
Attorneys practicing in this area of the law represent individuals and businesses from all different
industries. They help structure information technology transactions in a way that maximizes the
client's economic benefit while ensuring regulatory compliance.
6XPPDU\
A great deal of emphasis is also placed on anticipating potential sources of dispute between the
parties to a transaction, and crafting agreements that address these concerns, thereby reducing
the risk of litigation.
5.0 Assignment
What is cyber law?
6.0 References
a) Cyber law by Isaac Christopher Lubogo
1.0 Introduction
Cybercrime is divided into categories as explained below
0DLQFRQWHQW
Categories include:
D )UDXG
Fraud means actual fraud or some act of dishonesty. Constructive fraud may also arise through an
unfortunate expression calculated towards misleading another for selfish gain. And one may opt to mislead,
Consumers rely on cyber laws to protect them from online fraud.
E &RS\ULJKWLQIULQJHPHQW
A copyright is the exclusive right to do and to authorize others to do… certain acts in relation to
literary, dramatic and musical works, in relation to artistic works and in relation to sound recordings, films,
broadcasts, cable programs and published editions of works. Copyright infringement is an area of cyber law
that defends the rights of individuals and companies to profit from their creative works.
F 'HIDPDWLRQ
Many people use the internet to speak their mind. When people use the internet to say things that
are untrue, it can cross the line into defamation.
G +DUDVVPHQWDQG6WDONLQJ
Sometimes online statements can violate criminal laws that prohibit harassment and stalking.
When a person makes repeated or threatening statements about someone else online, they may violate
both civil and criminal laws. Cyber lawyers both prosecute and defend people when stalking occurs using
the internet and other forms of electronic communication.
H )UHHGRPRIVSHHFK
Freedom of speech laws also allows people to speak their minds. Cyber lawyers must advise their
clients on the limits of free speech including laws that prohibit obscenity.
I 7UDGHVHFUHWV
Cyber lawyers help their clients take legal action as necessary in order to protect their trade
secrets.
J &RQWUDFWVDQGHPSOR\PHQWODZ
Contracts protect individuals and corporations as they use technology and do business online
FRQFOXVLRQ
cyber-crime means the use of a computer as an instrument to further illegal ends
4.0 Summary
These are criminal activities carried out by means of computers or the internet.
5.0 Assignment
Does cyber-crime need a particular procedural law?
6.0 References
a) Cyber law by Isaac lubogo Christopher
1.0 Introduction
Cyber law is emerging widely in the present era. It is an era of developments and
innovations in different fields which are marked with the increasing use of technology in
different ways.
The unit is one of the fields of law that has received great importance with
development and will always have a widening scope as technological developments
never stop and so does the crime related to it.
4.0 Assignment
What are the recent developments in cyber law?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
ICT is an umbrella term that includes any communication device. Each country’s legal system has
its own sources of law.
4.0 Assignment
Discuss in detail the sources of ict law?
5.0 References
Cyber law by Isaac Lubogo Christopher
1.0 Introduction
ICT law includes contentious and non-contentious matters.
3.0 Conclusion
Ict law is a distinct field of law that comprises elements of various branches of the law, originating
under various acts or statutes of Parliament and the common law for instance; contract law, consumer
protection law, criminal law, patent law, copyright law, trade mark law intellectual property law, banking law,
privacy and data protection law, freedom of expression law, tax law, telecommunications law, work or
labour law, the law of evidence
4.0 Assignment
What are the different cyber law areas?
5.0 References
Cyber law by Isaac Lubogo Christopher
Module 2: THE EVOLUTION OF INTERNET AND THE LAW…………………………………………. page 12
1.0 Introduction
In the 1960s, during the Cold War, the US government saw the need for tracking all incoming
flights into US airspace. They created 26 SAGE (Semi-Automatic Ground Environment) computer
systems; these systems were distributed all over the USA and Canada. The Internet is a
worldwide, publicly accessible network of interconnected computer networks that transmit data
using the standard Internet Protocol (IP). It allows people to send and receive data wherever they
are in the world if they have internet access.
e) Society Functions
The society is a leader in developing standards for the computing industry, supporting more than
200 standards development groups in twelve major technical areas. the society develops
curriculum recommendations for programs in computer science and engineering and related
disciplines. The society has supported the major computer science accreditation board in the
United States and has participated in international accreditation efforts.
1.0 Introduction
The history of ICTs in Uganda is a short but intense one. Uganda started embracing ICTs as part
of its economic development strategy when the first mobile phone service came onto the Ugandan
scene in December 1994.
3.0 Conclusion
Developments in ICTs have dramatically changed the way information is collected, stored,
processed, disseminated and used, thus making it a powerful tool for modernization and
development.
4.0 Assignment
Discuss the historical development of ict in Uganda
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Backlash means a sudden violent backward movement or reaction
1.0 Introduction
Every computer is made up of the hardware and the software component. In this part, we discuss
the various components of a computer hardware and software. The hardware needed for Internet
access is divided into two i.e. the client side and the server side.
3.0 conclusion
In conclusion, computer hardware is any physical device used in or with your machine whereas
software is a collection of programming code installed on your computer’s hard drive.
4.0 Assignment
Mention five computer hardwares and softwares.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
MODULE 4: THE SOURCES OF CYBER LAW IN UGANDA…………. page 62
1.0 Introduction
Here we look at a set of documents that include the constitution, legislation, regulations and
contracts. How these documents relate to one another which has more force than the other.
1.0 Introduction
Cyber law has been developed in the many states to guarantee rights such as freedom of speech
and expression. It has also been developed internationally to handle issues of jurisdictional
challenges since cyber-crime is not limited to space. Various international law treaties, declaration
have recognized Cyber law and the rights under cyber laws.
2.0 Main content.
Here you will take a look at the different international laws that govern cyber usage and are
adopted by Uganda
a) The international covenant on civil and political rights: is a multilateral treaty adopted by the
General Assembly of the United Nations in 1966 and ratified by Uganda in 1995. Read Art.17,
Art.19,
b) The universal declaration of human rights: was adopted by the General Assembly of the United
Nations in 1948 and it contains guarantees for both right to privacy and freedom of expression.
Read: Art 12,19
c) The European Convention on Human rights: is the most important human rights instrument at
the European level. It conforms to the standards set by the ICCPR. Read; Article 8, 10
d) The Eu charter on fundamental rights: is the principal human rights instrument of the European
Union. It conforms in a great extent to the ICCPR and the ECHR but includes more far-
reaching provisions on data protection than the other international human rights instruments.
Read Art.52, art.7,8,11
e) The American convention on human rights: Read Art.11,13
f) The African charter on human and people’s rights. Read Art.9
g) International Principles on the Application of Human Rights to Communications Surveillance
(Necessary and Proportionate): They attempt to clarify how international human rights law
applies in the current digital environment, particularly in light of the increase in and changes to
Communications Surveillance technologies and techniques.
h) Joint declaration on freedom of expression and the internet: Read Art.19,1,3
i) The African declaration on internet rights and freedoms/adrirf. The development of the African
Declaration on Internet Rights and Freedoms is a Pan-African initiative to promote human
rights standards and principles of openness in the Internet policy formulation and
implementation on the continent.
3.0 Conclusion
As the survey above has shown, both freedom of expression and right to privacy are universally
protected in the majority of the international human rights instruments. Limiting these two rights
requires as a rule that the restrictions are laid down in law and that a due notice is taken of the
principles of necessity and proportionality
4.0 Assignments
a) What are the basic principles of international law?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
MODULE 6 : TERRITORIAL SOVEREIGNITY AND JURISDICTIONAL CHALLENGES IN CYBER LAW
....................................................................page Error! Bookmark not defined.
1.0 Introduction
Territorial sovereignty refers to the state’s complete and exclusive exercise of authority and power
over its geographical territory. Territorial sovereignty can be violated when third parties gain
unauthorized access to ICT in foreign countries without knowledge and permission of the host
country and or its law enforcement agent.
3.0 Conclusion
There may even be difficulties working between states or countries to bring litigation. Cyber
lawyers must navigate all of these challenges to effectively pursue their case on behalf of the
public or the client.
4.0 Assignment
a) What is the principle of territorial sovereignty?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Jurisdiction literally means the geographical areas.
1.0 Introduction
Computer Misuse refers to unauthorized access to private computers and network systems,
deliberate corruption or destruction of other people’s data, disrupting the network or systems,
introduction of viruses or disrupting the work of others; the creation and forwarding of defamatory
material, infringement of copyright, as well as the transmission of unsolicited advertising or other
material to outside organizations. It includes all the activities that undermine computer security
affect the integrity, confidentiality and availability of computer systems.
3.0 Conclusion
The Ministry of Information and Communications Technology (MoICT) of Uganda has been at the
forefront in the implementation of cyber laws. A lot has been achieved since 2011, when the cyber
laws were enacted.
4.0 Assignment.
Discuss in detail the status of implementation of cyber laws in uganda.
5.0 Conclusion
a) Cyber law by isaac Lubogo Christopher
1.0 Introduction
Challenge literally means something that needs great mental or physical effort in order to be done
successfully and thereof
3.0 Conclusion
Overall, cyber security capacity in Uganda lies between an initial and formative stage of maturity.
This expresses a state of maturity where some features have begun to grow and be formulated,
but may be ad-hoc, while these can be clearly evidenced.
4.0 Assignment
a) Discuss in detail the challenges in implementing cyber laws in Uganda
5.0 References.
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Electronic commerce is the buying and selling is the buying and selling of goods and services or
transmitting of funds or data over an electronic network, primarily the internet. It is a type of e-
business that features online sale transactions made using mobile devices, such as smart phones,
and tablets. The term e- commerce and e-business are often used interchangeably. It includes
mobile shopping, mobile banking, and mobile payments.
3.0 Conclusion
The legal regime in Uganda governing electronic contracts is the; The Electronic Transactions Act,
No. 8 of 2011, the Electronic Transactions Regulations, the Electronic Signatures Act, No.7 of
2011, the Electronic Signatures Regulations, The Contracts Act, 2010.
4.0 Assignment
Discuss the history of E-commerce in Uganda
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Electronic transactions is defined under section 2 of the Electronic Transactions Act to mean exchange
of information, or data ,the sale and purchase of goods and services between businesses, households,
individuals, governments and other public or private organizations conducted over computer mediated
networks.
b) Business to consumer. This is the retail part of e-commerce on the internet. It is when
businesses sell products, services, or information directly to consumers. Examples include Jumia
online shopping and adverts on various social media platforms.
c) Consumer to business. This is a type of e- business in which consumers make their products
and services available online for companies to bid on and purchase. This is the opposite of the
traditional commerce model of Business to consumer
d) Business to administration. This refers to transactions conducted online between companies and
public administration or government bodies. Many branches of government are dependent on e-
services or products in one way or another, especially when it comes to legal documents, registers,
social security, fiscals and employment. Businesses can supply these electronically
e) Consumer to administration. This refers to transactions conducted between individual
consumers and public administration or government bodies. The government rarely buys products
or services from citizens but individuals frequently use electronic means.
3.0 Conclusion
There are however certain hindrances which may be faced in using information and communication
technology in business transactions including, skepticism from consumers, questions on security of
information and uncertainty of legal validity of such transactions.
4.0 Assignment
a) What are the types of e-commerce
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Originally, the best evidence rule insisted that only an original document could be admitted as evidence
and copies were not allowed. However, this could cause significant hardship if the original had been
lost or destroyed
3.0 Conclusion
The courts have recognised that a rigid adherence to the best evidence rule is inappropriate in the
context of the accuracy with which copies of originals may now be made.
4.0 Assignment
a) What is the evidential status of electrical documents and electronic transactions in uganda?
5.0 references
a) cyber law by Isaac Lubogo Christopher
1.0 introduction
Information technology is quite prone to manipulation and abuse by its users. Where there are
electronic transactions which mostly involve money, the propensity of abuse naturally increases.
3.0 Conclusion
4.0 Contracts have become so common in daily life that most of the time we do not even realize that we
have entered into one. Right from hiring a taxi to buying airline tickets online, innumerable things in our
daily lives are governed by contracts. The Indian Contract Act, 1872 governs the manner in which
contracts are made and executed in India. It governs the way in which the provisions in a contract are
implemented and codifies the effect of a breach of contractual provisions.
5.0 Assignment
a) What are the ways of protecting the integretity of electronic transactions?
6.0 References
a) Cyber law by isaac Lubogo Christopher
1.0 Introduction
The Contract Act is the major law concerning commercial transactions in Uganda. It gives the essential
elements of a contract under section 10. Section 10 defines a contract as an agreement made with free
consent of parties for a lawful consideration and with a lawful object with intentions of being legally
bound.
3.0 Conclusion
While the rules on formation of contracts are well established in the offline world, there are significant
issues that call for enunciation of legal position in the electronic world.
4.0 Assignment
a) Expalin in detail the elements of a valid contract.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 6: E-CONTRACTING. ........................... Error! Bookmark not defined.
1.0 Introduction
This is a kind of contract formed in the course of e-commerce by the interaction of two or more
individuals using electronic means.
3.0 Conclusion
There has to be an intention to create lawful relations. The parties must be able to contract and there
must be free and unaffected consent.
4.0 Assignment
a) What is E-contract?
5.0 References
a) Cyber law by isaac Lubogo Christopher
1.0 Introduction
There are a number of types of electronic contracts .
3.0 conclusion
The contract act requires meeting of minds and the involvement of two parties negotiation is an
underlying presumption. But in case of e-contracts, the minds that meet are minds of the programmed
computer systems.
4.0 Assignment
a) How is an e-contract made?
5.0 References
a) Cyber law by isaac Lubogo Christopher
1.0 Introduction
A website is defined to mean to a set of related web pages located under a single domain name,
typically produced by a single person.
3.0 Conclusion
It's also important that businesses monitor their IP. A good way to do this is with customer review
websites. These sites can both help you identify areas for improvement and can show you if your IP is
being used without your permission.
4.0 Assignment
a) What is a web?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
An important part of complying with cyber law is protecting your customer's personal information. This
is true even if your business doesn't have a website. Many customers make use of online review sites
to explain their satisfaction with a company.
3.0 Conclusion
There are however certain hindrances which may be faced in using information and communication
technology in business transactions including, skepticism from consumers, questions on security of
information and uncertainty of legal validity of such transactions.\
4.0 Assignment
a) How are customers protected in electronic transactions act?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 10: LEGAL CONSEQUENCES ASSOCIATED WITH ELECTRONIC TRADING Error!
Bookmark not defined..
1.0 Introduction
Electronic trading involves setting up an account with a brokerage of your choice, including providing
your contact and fianncial information
.
2.0 Main content
The law requires that some contracts are in a particular form for example, by deed or in writing. (This is
now covered under the Contracts Act, which defines written contracts to include data message)
There may be doubts as to when the contract was made and, if the parties are in different countries,
which country’s law will apply to the contract.
3.0 Conclusion
The evidential weight of electronic documents must be considered and assessed.
3.0 Assignment
a) What are the benefits of electronic trading?
4.0 References
a) Cyber law by Isaac Lubgo Christopher
1.0 Introduction
Read: section 10 of the contracts act 2010 on definition of a contract.
3.0 Conclusion
Concerning the mode, the Act still recognizes that contracts can be in any form including oral, written
form or partly written and partly oral
4.0 Assignment.
a) What are the conditions of a valid contract?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 12: DISPATCH AND RECEIPT OF A DATA MESSAGEError! Bookmark not defined.
1.0 Introduction
The term dispatch and receipt of a data message are have a significant impact on electronic
commerce and can be considered in conjunction with the common law rules of offer and acceptance
and time of contract formation.
3.0 Conclusion
Where a document has actually been received and come to the attention of a person to be served or
provided with the document, then that means that there has been service, provision and receipt.
4.0 Assignment
a) What is a data message?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
An internet intermediary is an entity which provides services that enable people to use the internet.
3.0 Conclusion
it is important to appreciate that Internet intermediaries may have different and potentially competing
simultaneous roles as intermediaries, end- users and content/service providers.
4.0 Assignment
a) Is the internet an intermediary?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
UNIT 14: INTERNET ACCESS AND SERVICE PROVIDERSError! Bookmark not defined.
1.0 Introduction
Internet service provider (ISP), company that provides internet connections and services to individuals
and organisations.
3.0 Conclusion
ISPs range from large organizations, with their own geographically dispersed networks, local points of
presence and numerous connections to other such networks (Tier 1 providers - usually large
telecommunications companies), to small providers with a single connection into another organisation's
network
4.0 Assignment
a) What is the difference between access provider and service provider?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Intermediation is the process by which a firm, acting as the agent of an individual or another firm,
leverages its middleman position to foster communication with other agents in the marketplace that will
lead to transactions and exchanges that create economic and/or social value.
4.0 Assignment
a) What are the different types of online intermediaries?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
An e-commerce payment system is one that facilitates the acceptance of electronic payment for offline
transfer.
3.0 Conclusion
Banks now serve as Internet payment portals, transferring payments between payers, payees and their
account-holding institutions, and also transferring payments between buyers and sellers who transact
through Internet retail storefronts and through online auction sites.
4.0 Assignment
a) What are the advantages of electronic payment system?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Intermediation is the process by which a firm, acting as the agent of an individual or another firm (a
buyer or seller), leverages its middleman position to foster communication with other agents in the
marketplace that will lead to transactions and exchanges that create economic and/or social value.
3.0 Conclusion
To fulfill these functions over the Internet, different types of intermediaries have developed and include:
access and storage providers, marketplace exchanges, buy/sell fulfillment, demand collection systems,
auction brokers, virtual marketplaces, as well as search-engines, advertising networks, web
aggregators, news syndicators or social networking sites
4.0 Assignment
a) What are internet intermediaries?
5.0 Conclusion
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Network externalities have been defined as a change in the benefit, or surplus that an agent derives
froma good when the number of other agents consuming the same kind of good changes.
3.0 Conclusion
Therefore, building a critical mass of users is crucial to most Internet intermediary business models
4.0 Assignment
a) How many types of network externalities are there?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
A two-sided market exists when both buyers and sellers meet to change a product or service, creating
both bids to buy and offers(asks) to sell.
3.0 Conclusion
Which market represents the profit-making side and which market represents the loss- leader side
depends on the tradeoff between increasing network size versus growing network value.
4.0 Assignment
a) What are the characteristics of two-sided markets?
5.0 references
a) cyber law by Isaac Lubogo Christopher.
1.0 Introduction
Revenue model is a framework for genertaing financial income. It identifies which revenue source to
pursue, what value to offer, how to price the value, and who pays for the value.
3.0 Conclusion
The revenue model is a key component of the business model as it is an essential factor for delivering
products or services with high delivering products or services with high margins and funding the
business. Having a well structured business model is necessary for the success of any business
adding value to a product or service for customers.
4.0 Assignment
a) What are the three main types of revenue models.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Online contracting has been discussed above as a legal agreement that’s been created, agreed and
signed electronically, and is accessible on the internet via browser based software.
3.0 Conclusion
In Uganda, we have a number of laws that attempt to guarantee the consumer some form of electronic
protection.
4.0 Assignment
a) What are the principles of online contracting?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 22: LIABILITY OF INTERMEDIARIES FOR WRONG ACTIONSError! Bookmark not defined.
1.0 Introduction
Intermediation is the process by which a firm, acting as the agent of an individual or another firm (a
buyer or seller), leverages its middleman position to foster communication with other agents in the
marketplace that will lead to transactions and exchanges that create economic and/or social value. The
liability occurs where governments or private litigants can hold technological intermediaries liable for
unlawful content created by users of those services.
3.0 Conclusion
The ICT laws do not necessary provide that network service providers are liable for every action by
third parties. However, there is an obligation placed on them to ensure that crime is not committed on
their platforms. This platform is highly contentious given the limited control of service providers over
their consumers’ needs and choices.
4.0 Assignment
a) What are intermediary liabilities?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 23: ADVANTAGES AND DISADVANTAGES OF E- COMMERCE Error! Bookmark not defined.
1.0 Introduction
E-commerce refers to a business model that allows companies and individuals to buy and sell goods
and services over the internet. There are both merits and demerits when using this model.
3.0 Conclusion
The validity of click-wrap methods of acceptance is well accepted as equivalent to incorporation of
terms by signature.
4.0 Assignment
a) What are some examples of e-commerce?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
MODULE 9 ......... Error! Bookmark not defined.: ELECTRONIC SIGNATURES Error! Bookmark not
defined.
telegraph machines; Morse code encryption signature was used to verify the authenticity of the signer.
1.0 Introduction
Electronic signature means data in electronic form, which is attached to other electronic data and which
serves as a method of authentication.
Read section 2,4 of the electronic signatures act 2011\
3.0 Conclusion
In the context of Internet communications, the thing to be signed, an electronic document, exists more
as a matter of metaphysics than as a physical object.
4.0 Assignment
a) What is another name for electronic signatures?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
It is a fundamental requirement of electronic commerce that the transactions entered into via electronic
communication should be legally binding on the parties.
3.0 Conclusion
Thence, the requirement of a signature, be it an electronic signature is to authenticate acceptability to
an offer or any transaction
4.0 Assignment
a) What are the four requirements for an electronic signature to be valid?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
2
See section 10 of the Contracts Act 2010
1.0 Introduction
Today as virtually every type of transaction moves online, from government recrds to corporate
documents, electronic signatures are becoming a norm.
3.0 Conclusion
An electronic signature associates a digital sequence with an electronic document to represent a
handwritten signature on a paper printed document. This digital sequence should be considered similar
to a handwritten signature. In principle, an electronic signature is based on the use of two different
digital keys known as a key pair. Each key pair is made up of a private key and a public key. The two
are interdependent but can be used separately.
4.0 Assignment
a) Discuss in detail the different types of electronic signatures.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The idea of digital signature uses derived from two concepts namely Asymmetric cryptography and
RSA algorithm.
3.0 Conclusion
Digital signature software became a powerful business tool in recent years. It provides ability to sign
online. Documents, contracts, different kinds of form, tax filing can be executed online. This technology
is secure, legally robust, and efficient, and saves all parties time, money, and hassle.
4.0 Assignment
a) What are the characteristics of electronic signatures.
5.0 references
a) cyber law by Isaac Lubogo Christopher.
3.0 Conclusion
Electronic signatures are normally much harder to forge than manuscript signatures. Thus, the only
function that electronic signatures cannot provide is that of making a mark on a document.
4.0 Assignment
a) What is the legal requirement of electronic signatures?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
ID certificates literally mean a certificate that provides authentication of the identitiy claimed.
3.0 Conclusion
In the absence of evidence from the alleged signatory that some third party forged his signature, a
court should be satisfied by the evidence that the purported signatory was responsible for the
electronically signed document.
4.0 Assignment
Discuss in detail ID certificates
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT8: IMPORTANCE OF ELECTRONIC SIGNATUREError! Bookmark not defined.
1.0 Introduction
Electronic signatures are likely to be used for a wide range of transactions, which have legal
consequences.
3.0 Conclusion
However, the increase of paper-based processes being transposed into the digital realm makes current
signature policy definition insufficient to cope with the new needs that arise
4.0 Assignment.
a) What is the importance of electronic signatures?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
A license is an official permission or permit to do use, or own something.
3.0 Conclusion
Licenses and permits have become so burdensome due to legislation thaty favours the current
establishment of wealthy occupants that they decrease the supply of such occupations which raises
prices for the average consumer.
4.0 Assignment
a) What is the importance of information licensing?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
3.0 Conclusion
If an attribution procedure exists, to detect errors or changes in an electronic authentication, display,
message, record, or performance, and was agreed to or adopted by the parties or established by law,
and one party conformed to the procedure but the other party did not, and the nonconforming party
would have detected the change or error had that party also conformed, the effect of noncompliance is
determined by the agreement but, in the absence of agreement, the conforming party may avoid the
effect of the error or change.
4.0 Assignment
a) What do you understand by the term electronic authenication?
5.0 References
a) Cyber law by Isaac Lubogo christopher.
UNIT 11: SIGNING AND VERIFICATION IN DIGITAL SIGNATURE Error! Bookmark not defined.
1.0 Introduction
Verifying a digital signature is the opposite of signing data. Verifying a signature will tell you if the
signed data has changed or not.
3.0 Conclusion
In conclusion, an electronic signature is an important part of contract law as a whole and has a lot in it
that has modernized and standardized today’s business transactions.
4.0 Assignment
a) How are digital signatures generated?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
MODULE 10: THE RIGHT TO PRIVACY AND DATA PROTECTION ………….pg 219
1.0 Introduction
Privacy is defined to mean the right not to have one’s personal matters disclosed or publicized.
3.0 Conclusion
Privacy concerns have been articulated from the beginnings of large scale computer sharing.
4.0 Assignment
a) What do you understand by the term privacy?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing,
provision to third parties, and displaying of information pertaining to oneself via of the Internet. Internet
privacy is a subset of data privacy.
3.0 Conclusion
Privacy violations and threat risks are standard considerations for any website under development
Internet privacy is also known as online privacy.
4.0 Assignment
a) What do you understand by the term online privacy?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 3: PRIVACY ON THE COMPUTER………………….pg 221
1.0 Introduction
Here you will continue to look at the level of privacy protection an individual has while connected to the
internet.
3.0 Conclusion
It has become a growing worry, with browsing history and personal data at increased risk.
4.0 Assignment
a) What are examples of computer privacy?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Privacy and freedom of expression are intertwined rights in human rights law. They appear together in
international instruments, national constitutions and laws.
3.0 Conclusion
Privacy and the protection of personal data play a key role for the exercise of fundamental rights in a
broader sense. Many of the fundamental freedoms can only be fully exercised if the individual is
reassured that it is not subject of permanent surveillance and observation by authorities and other
powerful organizations.
4.0 Assignment
a) Discuss the concept of freedom of expression
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Information privacy law or data protection laws prohibit the disclosure or misuse of information about
private individuals. Here we look at the state of privacy and personal data protection in Uganda.
3.0 Conclusion
These laws are based on Fair Information Practice that was first developed in the United States in the
1970s by the Department for Health, Education and Welfare (HEW).
4.0 Assignment
a) What are the basic principles of data protection?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
Besides the use of laws and policies, there are other guidelines and IT standards which are highly
recommended for ensuring privacy. Here you will look into health and genetic privacy, privacy and
government records and databases.
3.0 Conclusion
It is important to note that what is available impacts data protection and privacy positively and
negatively. In some of the provisions and existing practices, privacy and data protection are upheld
while in some of the legislation, promote the curtailment of data and privacy rights.
4.0 Assignment
a) Discuss the guidelines and Ict solutions
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
This is literally defined to mean the monitoring, interception, collection, preservation and retention of
information that has been communicated, relayed or generated over communications networks to a
group of recipients by a third party.
3.0 Conclusion
This law gives almost unfettered discretion for state officials to conduct surveillance without the need to
obtain judicial authorization.
4.0 Assignment
a) Discuss the concept of communication surveillance.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 8: POLICIES AND SECTORAL INITIATIVES CYBER SECURITY POLICY pg 238
1.0 Introduction
Uganda has a national cyber security policy, the National Information Security Policy, published in
2014.
3.0 Conclusion
As regards privacy, the National Information Security Policy requires all organizations to "Ensure that
remote access solutions, including contracts with IT suppliers, comply with applicable legislative or
regulatory constraints in particular the Official Secrets Act, 1964 and the Access to information
regarding the handling of information, which is likely to prejudice the security of the State or interfere
with the right to the privacy of any other person."
4.0 Assignment
a) Discuss in detail the policies and sectoral initiatives cyber security policy in Uganda
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The Ugandan government has been investing heavily in CCTV. The number of cameras in the capital
Kampala appears to have increased over the last several years and the government periodically
announces new purchases of CCTV technology, primarily in Uganda's main cities.
3.0 Conclusion
In early 2017, the Uganda Police Force launched a new smartphone app to encourage citizens to
report crimes. Civil society groups including PI partner Unwanted Witness raised concerns about the
wide range of access permissions the app requires from its users.
4.0 Assignment
a) What do you understand by the term surveillance?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Privacy and personal and data protection in Africa has gained important relevance at the national,
regional and international levels.
3.0 Conclusion
There is also increased demand for mobile telecommunications. Globally, by the end of 2016, two
thirds of the world’s population (4.8 billion) had a mobile subscription. It is expected that by 2020, close
to three of the world population (5.7 billion people) will subscribe to mobile services. By the end of
2016, Sub Saharan Africa had over 420 million mobile subscribers with an equivalent penetration rate
of 43%, a Compound Annual Growth Rate of 6.1% over the five years to 2020 making it higher than the
global average by 50%.
4.0 Assignment
a) Elaborate the African perspectives on data protection and privacy.
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
The economic community of west African states is a regional group of 15 countries, founded in 1975.
Its mission is to promote economic integration in “all fields of economic activity, particularly industry,
transport, telecommunications, energy, agriculture, natural resources, commerce, monetary and
financial questions, social and cultural matters.
3.0 Conclusion
It is important to note that despite the provisions in the above instruments, the instruments are not
binding on ECOWAS member states but only offers guidelines on the ideal state of enjoyments of
privacy and personal data rights and penalization and associated procedures on cybercrimes
respectively.
4.0 Assignment
a) What role does ECOWAS play in combating cyber-crimes?
5.0 References
a) cyber law by Isaac Lubogo Christopher.
1.0 Introduction
The east African community is an intergovernmental organization composed of seven countries in the
African great lakes region in East Africa. It provides for cooperation, including the maintenance of a
common market and operation of common services between the different countries.
3.0 Conclusion
Implementation of the respectively presented legislation in the RECs is subject to the choice of a given
member states. While the vision of regional efforts is to ensure that the individual is guaranteed privacy
and personal data protection, this aim is watered down by the sovereignty doctrine of member states.
4.0 Assignment
a) How has the East African community combated the aspect of data protection and privacy?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
Here you will look at how the different African countries have recognized the right to individual privacy
in their national constitutions as a fundamental human right.
3.0 Conclusion
African Union member states have been fast on narrowing the space within which privacy is enjoyed
online by enacting legislation that limit freedom of expression, freedom of association and access to
information with little regard to the provisions of international human rights instruments.
4.0 Assignment
a) How have the African states combated the aspect of data protection and privacy?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
3.0 Conclusion
Rwanda, Zimbabwe and the Democratic Republic of Congo are considered to be having very restrictive
and delimiting legal regimes.
4.0 Assignment
a) Discuss in detail on the laws used in the countries mentioned therein have been adopted and are
such laws enforced.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Here you will look at role of the Civil Society Organizations (CSOs), the private sector, and the
academia on how they have ensured checks and balances in governance at the national, sub-regional,
regional and international levels.
3.0 Conclusion
Despite the contributions by CSOs and private sector, they often labelled and branded as supporters of
opposition and saboteurs of government activities.
4.0 Assignment
a) Discuss civil society and private sector initiatives on combating cyber-crimes.
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
UNIT 16: EUROPEAN PERSPECTIVES OF DATA PROTECTION THE RIGHT TO DATA PROTECTION
pg 251
1.0 Introduction
Here you will look at the European Union Treaties and in the European Union Charter of Fundamental
Rights for data privacy and protection.
3.0 Conclusion
Data protection laws are national but in the online environment, data does not respect borders. Cross-
border cooperation and agreements to deliver effective data protection are essential, particularly if the
EU is to maintain its values and uphold its principles. To achieve this, the EDPS regularly interacts with
EU and international DPAs and Regulators to influence and develop cross-border enforcement.
4.0 Assignment
a) Discuss the European perspectives of data protection and the right to data protection.
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
Here you will look at privacy, data protection and security in line with the European union weighing the
same with other public interests.
3.0 Conclusion
The scale of collection, storage and cross-border exchange of personal data between Member States
in crime and terrorism matters is enormous. The increased access to European databases as well as to
commercial data for law enforcement purposes are challenging the balance between privacy and
security.
4.0 Assignment
a) Discuss how you understand the aspect of privacy, data protection and security in line with cyber
laws and the European union.
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
UNIT 18: DATA PROTECTION LAW pg 256
1.0 Introduction
Protection of database and associated rights is gaining traction in Uganda. The vast volume and
deluge of data available with the Business Processing Offices in Uganda from jurisdictions which have
stringent database protection laws have increased the awareness and need for adequate protection of
personal data through domestic legislation or international commitments.
3.0 Conclusion
Database protection is essential to any company with any online component. Sufficient database
security prevents data bring lost or compromised, which may have serious ramifications for the
company both in terms of finances and reputation.
4.0 Assignment
a) What is a data base server?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Personal Data is defined in the Law as, “Any Data referring to an Identifiable Natural Person” and
Sensitive Personal Data is defined as, “Personal Data revealing or concerning (directly or indirectly)
racial or ethnic origin, communal origin, political affiliations or opinions, religious or philosophical
beliefs, criminal record, trade-union membership and health or sex life.
3.0 Conclusion
Under data protection, every organization (data controller) that processes personal information
(personal data) must notify the relevant authority, unless they are exempt in any case where data is or
has been processed. Failure to notify is a criminal offence.
4.0 Assignment
a) Discuss the data protection principles.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Here you will look at the different data protection principles.
3.0 Conclusion
The data protection principles apply to the data controller, which the general data protection regulation
defines as “natural or legal person, public authority, agency or other body which determines the
purposes and means of the processing of personal data.
4.0 Assignment
a) Discuss in detail the principles of data protection.
b) What do you understand by the principle of necessity?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
A constraint is a limitation that you place on the data that users can enter into a column or group of
columns. Here you will look at the rules enforced on the data columns of a table.
3.0 Conclusion
There are limits to data processing. Any data processing should be done within the established law
4.0 Assignment
a) What do you understand by contraints on data processing?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 22: THE RIGHTS OF THE DATA SUBJECTS AND THEIR CONFLICTING RIGHTS……….pg 276
1.0 Introduction
Data subject refers to any individual, person who can be identified, directly or indirectly via an identifier
such as a name,an ID number, location data or via factors specific to the persons physical,
physiological, genetic,mental economic, cultural or social identity. Here you will look at the rights of the
specific subjects and their conflicting rights.
3.0 Conclusion
Opinions recorded by healthcare staff about a patient in that patient’s care record constitute personal
data of the patient. However, they are also likely to be regarded as the personal data of their author,
whose rights will need to be considered in any processing decision.
The controller’s responsibility to exercise the subject’s rights
Read the GDPR act
4.0 Assignment
a) Discuss the rights of data subjects and their conflicting rights
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Employers always collect data from Employees before offering them jobs.
3.0 Conclusion
In Africa it was in 2014 when the African Union recognized the need to regulate data and introduced
the Convention On Cyber Security and Personal Data Protection. Uganda is one of the few countries
that have ratified to it.
Read Article 27 of the 1995 constitution
Section 6 and section 16 of the employment act
Article 15 of the DPPA
Section 17 and section 18 of the computer misuse act
4.0 Assignment
a) Discuss the aspect of data processing in the employment relations
5.0 References
a) Cyber law by Isaac Lubogo Christopher
b)
UNIT 1: INTRODUCTION
1.0 Introduction
Cyber-crime is defined by the black’s law dictionary to mean a crime involving the use of computer,
such as sabotaging or stealing electronically stored data.
2.0 Main content
Cybercrime is the most prevalent crime playing a devastating role in the Modern world. Not only the
criminals are causing enormous losses to the society and the government but are also able to conceal
their identity to a great extent.2 There are number of illegal activities which are committed over the
internet by technically skilled criminals.
3.0 Conclusion
In Uganda, the advent and development of ICT came with new crimes and this provided a platform for
the commission of existing crimes such as fraud, terrorism, money laundering, murder and theft.
Although these crimes could be prosecuted under the Penal Code Act, ICT related crimes such as
hacking and theft of computer programs or software poised a challenge to the legal system, hence the
need to enhance cyber security.
4.0 Assignment
a) What do you understand by cyber-crime?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
This study investigated the adequacy of the Cyber-crime legal framework in Uganda. Special attention
was given to elements of cyber-crime. This chapter presents the background to the study, the
statement of the problem, objectives of the study, research question, scope of the study, significance of
the study, justification and operational definition of terms and concepts.
3.0 Conclusion
This study investigated the adequacy of the Cyber-crime legal framework in Uganda.
4.0 Assignment
a) Discuss the effectiveness of the cyber legal frame work in Uganda.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The institutional framework is a set of formal organizational structures, rules and informal norms for
service provision. Such framework is the precondition for the successful implementation of other
sanitation and water management intervention tools and therefore needs to be considered in particular.
Here you will look at the different organizations that have helped in the implementation of the different
cyber laws in the Uganda
3.0 Conclusion
The Uganda Communications Commission (UCC) has set up its own CERT to compliment the national
team. This CERT prowls the Internet to monitor and report hi-tech crime including cyber terrorism,
computer intrusion, online sexual exploitation and cyber fraud. The team also coordinates all other
multi sectorial agencies in this fight against cybercrime; liaises with other law enforcement agencies in
the prosecution of cyber related crimes and collaborates with other regional and international agencies
with similar remits.
4.0 Assignment
a) Discuss how the different organizations have implemented on combating cyber-crime in Uganda.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Cyber-crime is defined in the black’s law dictionary to mean a crime involving the use of a computer
such as sabotaging or stealing electronically stored data. Here you will look at the elements of cyber-
crime in Uganda.
2.0 Main content
These include:
a) Illegal access
b) Illegal data acquisition
c) Illegal interception
d) Data interference
e) System interference
f) Erotic or pornographic material
g) Illegal gambling and online games
h) Fraud and computer relating crimes
i) Misuse of devices
3.0 Conclusion
Cybercrime has only the third highest incidence rate in Uganda at 31% (tying with Asset
Misappropriation), it continues to be one of the biggest potential threats to organizations in the future.
At 30%, Cybercrime scored the highest among Uganda's respondents as the form of economic crime
likely to be most disruptive to their organizations in the next 24 months, both monetarily and otherwise.
4.0 Assignment
a) Discuss in detail the elements of cyber-crime in Uganda
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Here you will look at the factors that have hindered the development of cyber law enforcement in
Uganda.
3.0 Conclusion
Cyber security capacity in Uganda lies between an initial and formative stage of maturity. This
expresses a state of maturity where some features have begun to grow and be formulated, but may be
ad-hoc, while these can be clearly evidenced.
4.0 Assignment
a) Identify the gaps in the Uganda Legislative laws in combating cyber-crime.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Here you will look at the measures to be taken in combating the weakness of Uganda’s cyber law
3.0 Conclusion
In regard to Substantive and Procedural law the parliament of Uganda should amend the Evidence Act
to expressly provide for the admissibility of electronic evidence; amend the Computer Misuse Act to
impose an obligation on citizens/persons to report any incidents of cyber-crime.
4.0 Assignment
a) Discuss how the cyber law weakness can be combated
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
These are areas that are related to cyber law. Cyber security looks to address weaknesses in
computers and networks.
3.0 Conclusion
With the right to cyber security, businesses and people can protect themselves from cybercrime
4.0 Assignment
a) Discuss the concept of cyber-crime and cyber security.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
An article is deemed to be obscene if its effect or (where the article comprises of two or more distinct
items) the effect of any one of its items is, if taken as a whole, such as to tend to deprave and corrupt
persons who are likely having regard to all relevant circumstances to read, see or hear the matter
contained or embodied in it.
3.0 Conclusion
Accordingly, it is difficult to ascertain the extent and popularity of the Internet porn business. What is
known is that pornography is comprised of legal as well as illegal elements. Many national
governments are focused on preventing the production, distribution and consumption of pornographic
materials involving children.
4.0 Assignment
a) How are the loopholes in obscene publications being handled in Uganda?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Cyber harassment refers to any intentional, substantial and unreasonable intrusion into the private life
of a person that causes the person to suffer mental distress.
2.0 Main content
Read section 24 of the Computer Misuse Act 2011
3.0 Conclusion
Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT
and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber
harasser’s primary goal is to exert power and control over the targeted victim(s)
4.0 Assignment
a) Discuss the concept of Cyber Harassment with reference to the Uganda legislative system.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Cyber stalking is the use of Information and Communications Technology (ICT) to stalk, control,
manipulate or habitually threaten a child, adult, business or group.
3.0 Conclusion
Today, cyber -stalking is easier than ever, considering the anonymity provided by electronic
communication. On the Web, it is not difficult to conceal one’s identity or to provide incorrect personal
information. Websites, e -mail, chat rooms, and discussion forums provide stalkers with a variety of
opportunities to harass others. They also offer stalkers access to the private information of their victims.
4.0 Assignment
a) How do you understand by the term cyber-stalking?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Here you will look at the aspect of communication and what amounts to being offensive communication
2.0 Main content
Legitimate communication occurs where the purpose of a particular electronic communication is
genuine and lawful and occurs between genuinely existing individuals or entities. Where a person
poses as a legitimate or trusted entity or individual and yet seeks to convince another to handover their
personal details or information or any valuable thing, that act is called phishing; it is a form of electronic
fraud.
Look at section 13,15,16,25 of the computer misuse act 2011
3.0 Conclusion
To prove offensive communication, the prosecution must show that the communication was willfully or
stubbornly sent to the complainant, the communication was repeatedly sent to the complainant, the
communication disturbed or attempted to disturb the peace, quiet or right to privacy of the complainant,
the accused was responsible for the said offensive communication.
4.0 Assignment
a) What amounts to offensive communication in Uganda?
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
This literally means the intentional or unintentional release of PII (personally identifiable information) to
an unauthorized person or untrusted environment.
3.0 Conclusion
This happens when someone gains access to a website, program, server,service or other system using
someone else’s account or other methods.
4.0 Assignment
a) What are types of unauthorized disclosure?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
3.0 Conclusion
Read section 18 of the computer misuse act 2011
4.0 Assignment
a) Discuss the concept of electronic fraud
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Cyber-hooliganism is defined as a computer network related mischief such as defacing websites or
releasing a virus or worm, without causing serious disruptions for the general population, or without
creating widespread panic or terror.
3.0 Conclusion
Cyber-hooliganism is essentially non-violent, but can cause financial losses. For example, the creation
of the I Love You virus or the destruction of the NASA web page were both cyber- hooliganism acts.
4.0 Assignment
a) Discuss the concept of cyber-hooliganism
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 15: HACKING AND ISSUES OF COMPUTER HACKING …….pg 339
1.0 Introduction
The term refers to the unauthorized access of another's computer system
3.0 Conclusion
Educational institutions must clearly establish use policies and delineate appropriate and inappropriate
actions to all individuals who access information via a computer.
4.0 Assignment
a) Who is a hacker?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 16: IDENTITY THEFT ………….pg 340
1.0 Introduction
Identity Theft is a truly modern crime, being crafted out of the sight of, and often beyond the effective
reach of, the victim.
3.0 Conclusion
Combating identity theft is difficult because each state or group of states has a different idea about how
to combat the issue, about how much privacy invasion is allowed under a crime-fighting or civil litigation
plan, and about what system would be useful for regulating and granting jurisdiction.
4.0 Assignment
a) What do you understand by the concept of identity theft?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Cyber-terrorism entails Attacks and threats of attack against computers, networks, and the information
stored therein, with the objective of intimidating or coercing a government or its people in furtherance of
political or social objectives.
3.0 Conclusion
Cyber-terrorism is indeed a grave crime considering the substantial losses that even a single
successful operation can generate. Cyber-space is constantly under assault from cyber-spies, thieves,
saboteurs, and thrill seekers break into computer systems, steal personal data and trade secrets,
vandalize Web sites, disrupt service, sabotage data and systems, launch computer viruses and worms,
conduct fraudulent transactions, and harass individuals and companies.
4.0 Assignment
a) What do you understand by cyber-terrorism?
5.0 References
a) Cyber-law by Isaac Lubogo Christopher
1.0 Introduction
This entails the deliberate use of information warfare by a state, using weapons such as electro-
magnetic pulse waves, viruses, worms, Trojan horses, etc., which target the electronic devices and
networks of an enemy state.
4.0 Assignment
a) Discuss the concept of Cyber-war.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
In the corporate world, Internet hackers are continually looking for opportunities to compromise a
company's security in order to gain access to confidential banking and financial information.
3.0 Conclusion
Merchandise or services that were purchased or contracted by individuals online are never delivered.
The fraud attributable to the misrepresentation of a product advertised for sale through an Internet
auction site or the non-delivery of products purchased through an Internet auction site. Investors are
enticed to invest in this fraudulent scheme by the promises of abnormally high profits.
4.0 Assignment
a) How do you understand the concept of bank or credit card related crimes?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Cyber defamation is also called as Cyber smearing. Cyber Defamation occurs when defamation takes
place with the help of computers and / or the Internet.
3.0 Conclusion
Many researchers and computer forensic investigators argued different steps and approaches taken
when conducting a computer crime investigation. Nevertheless, the majority agrees that the bold steps
included in such an investigation include: securing the suspected computer, securing the potential
evidence, collecting evidence, analyzing evidence and lastly preparing and presenting the evidence.
May (2002), suggests some preliminary steps that must be considered before conducting an
investigation.
4.0 Assignment
a) What is cyber-defamation in relation to case law
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Besides understanding cyber law, organizations must build cyber security strategies.
3.0 Conclusion
A cyber security strategy is a plan of actions designed to improve the security and resilience of national
infrastructures and services hence the use of the various cyber-security strategies.
4.0 Assignment
a) Discuss in detail the various cyber security strategies.
5.0 References
a) Cyber law by Isaac Lubogo Christopher.
1.0 Introduction
Intermediary liability refers to when internet intermediaries involved in the transmission processing or
storage of electronic data across on the internet are held liable for unlawful content transmitted or
stored on their networks.
Main content
According to the OECD “internet intermediaries bring together or facilitate transactions between third
parties on the internet. They give access to, host, transmit and index content, products and services
originated by third parties on the internet or provide internet based services to third parties.
Here you will look at
¾ The examples of internet intermediaries
¾ When does intermediary liability occur
¾ Assessing intermediary liability
¾ The need for limitations on liability
¾ Protection for intermediaries
¾ Copyright and digital piracy
¾ The fall and rise of intermediary liability online
2.0 Conclusion
It is inevitable due to the openness of the internet that “some users will post content or engage in
activity that is unlawful or otherwise offensive.”3 Sometimes intermediaries may find themselves legally
liable for content on their networks created by third parties, including content which they did not even
know was on their networks.
It is important to institute proceedings against the intermediary than the user himself. It is easier to
identify an intermediary than a user, and thus easier to bring them before a court for a criminal or civil
offence
3.0 Assignment
a) Discuss the concept of internet intermediaries
3 Center for Democracy and Technology, Intermediary Liability: Protecting Internet Platforms for Expression and
Innovation, (Center for Democracy and Technology, April 2010) p1, https://www.cdt.org/paper/intermediary-
liabilityprotecting-internet-platforms-expression-and-innovation.
4.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Although the terms Internet service provider and ISP are in universal usage, they are potentially
confusing because they do not necessarily distinguish between the underlying roles of access provider,
host, and others.
3.0 Conclusion
In this document Internet service providers are generally meant to signify Internet access providers,
which provide subscribers with a data connection allowing access to the Internet through physical
transport infrastructure. This access is necessary for Internet users to access content and services on
the Internet and for content providers to publish or distribute material online.
4.0 Assignment
a) Name any internet service providers that you know
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
This is provided for under sections 29-34 of the Electronic Transactions Act, 2011
3.0 Conclusion
It should be noted that intermediaries are subject to liability in accordance with their jurisdiction and in
this case territorial jurisdiction
4.0 Assignment
a) Discuss the liability of intermediaries in line with the ugandan framework
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
3.0 Conclusion
Information technology is quite prone to manipulation and abuse by its users. Where there are
electronic transactions which mostly involve money, the propensity of abuse naturally increases.
4.0 Assignment
a) Discuss the authencity and evidence in Uganda.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Privacy which is very important in a individuals life in the sense that it is the only form of dignity and
pride that any individual has and if no laws made to protect this right people in a surveillance so will see
just become like ‘puppets' in the society whom have no form of control what so ever as to how their
personal data and information are being used and manipulated by the ‘Puppet masters' also known as
the ‘Data controllers' as they please which could be dangerous to individuals in the society.
3.0 Conclusion
To say we are consciously or unconsciously sleep walking into surveillance society is a question of fact
because frankly speaking individuals in the society go through some form of surveillance in one way or the
other.
4.0 Assignment
a) What do you understand by the term Privacy?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
A surveillance society is a huge area of contention in relation to privacy in the sense that it affects an
individual's privacy in every aspect of their lives.
2.0 Main content
Here you will look at the regulations of privacy and recommendations therein
¾ Look at the case of R v Brown
¾ Leander v Sweden
¾ Campbell v Mirror group Newspapers
¾ Also Article 8 of the European convention on human rights
¾
3.0 Conclusion
As individuals in a surveillance society we need to have the right to preserve our privacy but if our
actions keep on being monitored all the time either by technological or non-technological means of
surveillance this aim cannot be achieved because everything we do in a surveillance society leaves a
trail behind that can be traced back to us and also joint with the fact that our personal data is constantly
being transferred from one data base to another and processed by different processors makes access
to our personal information easy for people.
4.0 Assignment
a) Discuss issues of privacy in relation to a surveillance society
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 1: INTRODUCTION
1.0 Introduction
Cloud computing is the practice of using a network of remote servers hosted on the internet to store,
manage and process data rather than a local server or a personal computer.
3.0 Conclusion
The legal and regulatory landscape around cloud computing is by no means static.
4.0 Assignment
a) What is cloud computing?
5.0 references
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
Nowadays, the storage service has evolved considerably, allowing us to store important corporate data
in the clouds. Thus, authorized corporate users access information easily from any location, at any
time, via mobile devices.
3.0 Conclusion
Finally, cloud computing is a service offered by a company to natural persons or client companies upon
an atypical contract, which has as its object, services such as storage, processing and backup content,
providing customized applications and others on the server contractor, allowing the client or other
authorized person to have secure access from anywhere, anytime, through any mobile device.
4.0 Assignment
a) Discuss the concept of cloud computing and the information security concept
5.0 References
a) Cyber law by Isaac Lubogo Christopher
UNIT 1: INTRODUCTION
1.0 Introduction
This is a process of public administration and the provision of government services through the use of
information and communication technology. This definition is wide enough to cover the use of facilities
provided by the Internet, intranet and extranet communication systems.
3.0 Conclusion
Cyber democracy is a study of the potential for "electronic democracy" through the examination of case
studies in US and European cities and civic projects. It aims to strike a balance between enthusiastic
and dismissive approaches to "electronic democracy." The authors consider the impact of new
technology with regard to the history of broadcasting and communications technology--in particular, the
ways in which the principles and requirements of public service and universal access will, or will not be
maintained.
4.0 Assignment
a) What do you understand by electronic government system?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The way of carrying out business in the world today is changing at a very high speed with new
technologies taking a center stage. Both government and the private sector have no alternative other
than to move in that direction and adopt the emerging new technologies to modernize their service
delivery.
3.0 Conclusion
Governments must position themselves to ensure investment in and application of new technologies to
harness the benefits of these technologies.
4.0 Assignment
a) Discuss the concept of Electronic government (E-government) in Uganda.
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The Ugandan society has transformed due to the growth of the legal framework and its enforcement
3.0 Conclusion
Have clearly defined Interoperability policy. The e–governance architecture needs to ensure that the
components are scalable and adaptable to the future requirements. It has also to ensure that the Local
architecture fits into the State level and the same into National and Global architecture. Interoperability
is a major criterion while defining the architecture.
4.0 Assignment
a) How has the Ugandan society transformed?
5.0 References
a) Cyber law by Isaac Lubogo Christopher
MODULE 16: INTELLECTUAL PROPERTY ISSUES ……………….pg 502
1.0 Introduction
An important part of cyber law is intellectual property. Intellectual property can include areas like
inventions, literature, music, and businesses. It now includes digital items that are offered over the
internet.
3.0 Conclusion
Protecting IP can be difficult over the internet. An example of this would be the popularity of pirated
movies and music. Each business that relies on the internet needs to develop strategies for protecting
their IP. Governments can also take part in this process.
4.0 Assignment
a) Discuss the IP rights related to Cyber law
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The widespread "search engines" in Internet allow to track down the information scattered through the
web in a very quick way and just by typing simple questions.
3.0 Conclusion
A search engine operator does not create, change, and upload the content on the Internet, it cannot be
held liable for infringement. The individual who creates, changes, and uploads the content on the
Internet (i.e. the content provider) would be the appropriate person to hold liable for infringement. The
search engine operator also does not have any responsibility to monitor content and is not accountable
for infringing the protected content rights of third parties. Therefore, search engine operators are not
liable under criminal or civil law for listing infringing content among search results
4.0 Assignment
a) Discuss the concept of intellectual property law and search engines
5.0 References
a) Cyber law by Isaac Lubogo Christopher
1.0 Introduction
The laws which govern the protection of computer software fall under the domain of intellectual
property.
3.0 Conclusion
While copyright protection is conferred relatively easily, the scope of protection (and consequently the
monopoly granted) is narrower if compared with that provided by trademarks or even more so patents.
4.0 Assignment
a) What are the three step processes linking the public welfare with intellectual property?
5.0 References
a) Cyber law by Isaac Christopher Lubogo
1.0 Introduction
A patent literally means a government authority or license conferring a right or title for a set period
especially the sole right to exclude others from making, using or selling an invention
3.0 Conclusion
If a computer software is merely an algorithm it should not be protected under patents. The term of
algorithm is not defined in the patent act. If the invention is technical in nature it will entitled to get
protection under patents.
4.0 Assignment
a) What do you understand by a patent protection?
5.0 Conclusion
a) Cyber law by Isaac Lubogo Christopher
ԙ Doping in sports
ԙ Trademark
ԙ National laws, International laws and treaties
ԙ Unregistered marks and Registered marks
ԙ Procedures for registered marks and Removal of trademark
ԙ Enforcement and Remedies
ԙ Ownership changes and right transfers
ԙ Related rights and Online issues
THE LAW OF SPORTS AND ENTERTAINMENT IN UGANDA PAGE.... 223-224
Remedies for Infringement
Trademark law
The Lanham Act of 1946
Service Marks and Collective Marks
Identification Function of a Trademark
Secondary Meaning
Trademark Infringement
Ambush Marketing
Trademark Law and Nicknames
Trademark Law and the Olympics
THE LAW OF SPORTS AND ENTERTAINMENT IN UGANDA PAGE....225-254
Copyright law, Copyright law; a case of USA
Copyright Law and the Internet
Image rights and the right of publicity
THE LAW OF SPORTS AND ENTERTAINMENT IN UGANDA PAGE....255-279
TOPIC 11 ARBITRATION
ϭͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x The large oil companies up until the first world war, early competition
x Between the wars (1): the role of the state
x Between the wars (2): cooperation and competition between oil companies.
x New entrants into the oil sector
x Developments in the U.S.: quotas, isolation of U.S. market
x Early signs of the oil shock, The first oil shock
x Second oil shock, weakening of opec and fall in prices
x The twenty first century: sustained high prices
x High oil PRICES; how do they affect demand
x High oil prices; how do they affect supply
x New oil nationalism, prices in the future years
x Understanding oil and gas in Uganda, The difference between oil and gas
x The large oil companies up until the first world war, early competition
x Between the wars (1): the role of the state
x Between the wars (2): cooperation and competition between oil companies.
x New entrants into the oil sector
x Developments in the U.S.: quotas, isolation of U.S. market
x Early signs of the oil shock, The first oil shock
x Second oil shock, weakening of opec and fall in prices
x The twenty first century: sustained high prices
x High oil PRICES; how do they affect demand
x High oil prices; how do they affect supply
x New oil nationalism, prices in the future years
x Understanding oil and gas in Uganda, The difference between oil and gas
ϮͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Introduction
x Relevant aspects of the bill
x Environment management
x Management of waste generated from the drilling operations
x How Uganda is prepared to address the potential for oil spills given the
presence of international water bodies in the Albertine Graben
ϯͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Introduction
x Legal Framework on Implementation of principle of Intergenerational
Equity in the Oil and Gas Sector in Uganda
x Evaluation of National Laws, regulations and Policy Framework for
Intergenerational Equity in the Oil and Gas Exploration and Production
Sector in Uganda
x Policy framework in Uganda, Revenue management laws.
x International Legal Framework for intergenerational equity in the gas
exploration and production in Uganda
x Binding International law on implementation of intergenerational equity
x Nonbinding (soft law) principles of Intergenerational Equity
x Solutions to the problems.
ϰͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Introduction
x Problems associated with the resource curse (Oil),Solutions to the Oil /
resource curse
x Regional and International Commitments, The international role in
combatting corruption:
x Challenges encountered in harmonizing the legal framework with the eiti
standard
x The paradox of plenty resource curse, Illicit Financial Flows
x Key Laws on Anti-Corruption
ϱͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Introduction
x Problems associated with the resource curse (Oil),Solutions to the Oil /
resource curse
x Regional and International Commitments, The international role in
combatting corruption:
x Challenges encountered in harmonizing the legal framework with the eiti
standard
x The paradox of plenty resource curse, Illicit Financial Flows
x Key Laws on Anti-Corruption
ϱͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Introduction
x Understanding the oil curse
x Introduction
x Understanding the oil curse
x Coordination and Resource Curse
x The policy and legal framework for solving the oil curse
x Capacity and institution building, Shocks from fluctuating oil prices,
Roles of departments. Planning of resultant urban centers.
x The Legal Framework, The Current Legal Framework and Its Adequacy
x Strengthening Checks and Balances of Decision-Making Institutions.
x A comparative analysis, features common to all mining states including
Petro states.
x A comparison with other countries. Norway: the story of success
ϲͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Introduction
x Understanding the oil curse
x Coordination and Resource Curse
x The policy and legal framework for solving the oil curse
x Capacity and institution building, Shocks from fluctuating oil prices,
Roles of departments. Planning of resultant urban centers.
x The Legal Framework, The Current Legal Framework and Its Adequacy
x Strengthening Checks and Balances of Decision-Making Institutions.
x A comparative analysis, features common to all mining states including
Petro states.
x A comparison with other countries. Norway: the story of success
ϳͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Arbitration, Mediation,Conciliation
x Expert Determination, Early Neutral Evaluation835,Mini Trial
x Adjudication, Negotiations. , Hybrid Processes in ADR
x A comparative analysis of Dispute Resolution in the Oil and Gas Sector
of other Countries. Conclusion
x Importance of having formal specialized courts to deal with oil and gas.
x Prospective challenges that the courts will encounter when dealing with
oil related disputes.
x Importance of having formal specialized courts to deal with oil and gas.
x Prospective challenges that the courts will encounter when dealing with
oil related disputes.
ϴͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
x Importance of having formal specialized courts to deal with oil and gas.
x Prospective challenges that the courts will encounter when dealing with
oil related disputes.
ϵͮW Ă Ő Ğ
OIL AND GAS COURSE DESCRIPTOR
REFERENCES
x Statutes
x Secondary Sources
x Internet sources
x Government publications
ϭϬͮW Ă Ő Ğ
COURSE DESCRIPTOR
COURSE DESCRIPTOR FOR THE PSYCHOLOGY OF LAW
ISAAC CHRISTOPHER LUBOGO
MODULE
TABLE OF CONTENTS
MODULE 1 GENERAL PRINCIPLES OF THE PSYCHOLOGY OF LAW
UNIT 1 Introduction of the law of psychology in Uganda
UNIT 2 History of psychology’s relationship to the law
UNIT 3 Role of psychologists in the legal system
UNIT 4 The theories and models of justice and their relationship to
psychology.
UNIT 5 The methods used to study the psychological aspects of the
justice.
CONTENTS
1.0 Introduction
2.0 objectives
2.1 Main content
2.2 Law and psychology
2.3 Fields of psychology
2.4 Methods of psychology
2.5 Goals of psychology
3.0 Conclusion
4.0 Summary
5.0 assignments
6.0 references
1.0 INTRODUCTION
This is an introductory unit. It introduces us to the psychology of law and how it should be developed in the
Ugandan court. Laws are human creations that have as their major purpose the resolution of human conflict.
As society changes, new conflicts surface, leading to expansion and revision of the legal system. A
psychological approach focuses on individuals as agents’ withing a legal system, asking how their internal
qualities (personality, values, abilities and experiences) and their environment including the law itself, affect
their behavior.
2.0 OBJECTIVES
By the end of this unit you should be able to:
a) Define the psychology of the law
b) Trace the origin of the psychology of law
c) Describe the legal standards for competency and criminal responsibility
d) Provide an overview of the role of psychology at the sentencing stage of criminal cases
4.0 CONCLUSION
On the strength of the definition of psychology, the learner will be able to understand how to adopt its
concept to the legal system and how the two concepts work hand in hand.
5.0 SUMMARY
This unit has introduced you briefly to the psychology of law. You should now be able to: trace the origin
of the psychology of law, explain the fields and methods of psychology.
6.0 ASSIGNMENT
How can the methods of psychology be adopted in the legal concept and in court?
7.0 REFERENCES.
a) The psychology of law; John Monahan, school of law, University of Virginia,Charlottesville,Virginia
22901
b) Pozzulo. J.Bennell. C. and Forth. A (2018) Forensic Psychology, 5th edition. Toronto. Pearson Press.
ISBN 978-0-13-430806-7
c) The psychology of law by Isaac Christopher Lubogo 2022 by Jescho publications
UNIT 2: HISTORY OF PSYCHOLOGY’S RELATIONSHIP TO THE LAW.
CONTENTS
1.0 Introduction
2.0 Main content
2.1 Structuralism
2.2 Functionalism
2.3 Gestalt psychology
2.4 Psychodynamic Model
2.5 Huministic Model
2.6 Behaviorism
2.7 Cognitive Model
3.0 More on history
4.0 Conclusion
5.0 Summary
6.0 Assignments
7.0 References
1.0 INTRODUCTION
Under this unit you will look at the origin of psychology and its relationship to the law Questions of
potential interactions between psychology and the law existed long before.
2.1 STRUCTURALISM
This was the first school of psychology and focused on breaking down mental processes into the
most basic components.
2.2 FUNCTIONALISM
This is an early approach to psychology that concerned with what the mind does, the functions
of mental activity and the role of behavior in allowing people to adopt to their environment.
2.6 BEHAVIORISM
The approach that suggests that observable behavior should be the focus
4.0 CONCLUSION
The history introduces us to how the two concepts are interrelated and on how they work hand in hand.
5.0 SUMMARY
The history dates back in the U.S origin and European origins in the 19th century in the work of
experimental psychologists.
6.0 ASSIGNMENTS
Discuss in detail the history of psychology and the law.
7.0 REFERENCES
a) https://www.slideshare.net/muddsar/introduction-to-psychology-9892542
b) http://criminal-justice.iresearchnet.com/forensic-psychology/history-of-forensic-psychology/legal-
psychology/#:~:text=The%20origins%20of%20legal%20psychology,of%20events%20was%20cons
idered%20unreliable%20(
c) The psychology of law by Isaac Christopher Lubogo 2022 by Jescho publications
The approach based on the belief that behavior is motivated by unconscious inner forces over
which the individual has little control.
2.6 BEHAVIORISM
The approach that suggests that observable behavior should be the focus
4.0 CONCLUSION
The history introduces us to how the two concepts are interrelated and on how they work hand in hand.
5.0 SUMMARY
The history dates back in the U.S origin and European origins in the 19th century in the work of
experimental psychologists.
6.0 ASSIGNMENTS
Discuss in detail the history of psychology and the law.
7.0 REFERENCES
a) https://www.slideshare.net/muddsar/introduction-to-psychology-9892542
b) http://criminal-justice.iresearchnet.com/forensic-psychology/history-of-forensic-psychology/legal-
psychology/#:~:text=The%20origins%20of%20legal%20psychology,of%20events%20was%20cons
idered%20unreliable%20(
c) The psychology of law by Isaac Christopher Lubogo 2022 by Jescho publications
UNIT 3: ROLE OF PSYCHOLOGISTS IN THE LEGAL SYSTEM.
CONTENTS
1.0 Introduction
2.0 Main content
3.0 Conclusion
4.0 Summary
5.0 Assignments
6.0 References.
1.0 INTRODUCTION
A Psychologist evaluates, diagnoses, treats and studies behavior and mental processes. The duties
of a legal psychologist will depend largely on their employment setting. In some instances, legal
psychologists are employed by the district attorney’s office or private defense attorney’s to serve as
assessors’ consultants.
3.0 CONCLUSION
In conclusion therefore, a legal psychologist can work in a variety of settings involving the criminal
justice system, or civil court system. Other venues are correctional facilities or juvenile detention
centers. They may have to appear in court and travel throughout their state or nationwide if they are
licensed for practice.
4.0 SUMMARY
The best known role of the psychologist is that of an expert witness in criminal proceedings. The
legitimacy of this role was clearly established in the land mark case of JENKINS V UNITED STATES
(1972). Psychologists also assist the court by making evaluations of defendants to determine
competency to stand trial.
5.0 ASSIGNMENTS.
In what capacity do psychologists testify in the various courts?
6.0 REFERENCES
a) https://www.psychologyschoolguide.net/psychology-careers/legal-psychologist/
b) http://criminal-justice.iresearchnet.com/forensic-psychology/psychology-and-law/roles-of-
psychologists/
c) The psychology of law by Isaac Christopher Lubogo 2022 by Jescho publications
UNIT 4 THE THEORIES AND MODELS OF JUSTICE AND THEIR
RELATIONSHIP TO PSYCHOLOGY.
CONTENTS
1.0 Introduction
2.0 Main content
a) Utilitarianism
b) Contractarianism
c) Egalitarianism
2.1 Sub- content
a) The crime control model
b) The due process model
3.0 Conclusion
4.0 Summary
5.0 Assignments
6.0 References
1.0 INTRODUCTION
The term theory is defined to mean a body of knowledge that is broad in scope and aim to explain robust
phenomena. The unit describes the current state of affairs regarding the psychology of justice. The overview
of the most influential psychological theories of injustice describe a representative set of studies and empirical
findings from justice research in psychology and discuss how these theories and findings can be used to
better understand justice related perceptions, cognitions, emotions and behaviors and to contribute to
peaceful solutions to justice conflicts in our daily lives. It describes psychological justice research on three
different levels, the first individual level focuses on justice within the individual and discusses individual needs,
concerns and motives that may be able to explain whether why and under what circumstances people care
about justice and when they do not. The second interpersonal level focuses on justice between individuals
and discusses distributive, procedural, interactional, and retributive justice. The third, intergroup level focuses
on justice-related conflicts between social groups or social “categories” such as companies, nations, or
cultures. In this section, we will discuss what leads people to commit injustices to members of other groups
and how group members-even those who were originally uninvolved in the events that originally sparked a
conflict-respond to perceived group-based injustices.
2.1 SUB-CONTENT
a) The crime control model: In this model, psychology focuses on the study of the behaviors
and motivations of criminals. As such, they research is conducted to determine why
crimes occur, consultation with police departments to identify suspects, or provide
expert testimony in court cases. Criminal psychologists may also engage in criminal
profiling.
b) The due process model: focuses on having a just and fair criminal justice system for all
and a system that does not infringe upon constitutional rights. Further, this model would
argue that the system should be more like an ‘obstacle course,’ rather than an ‘assembly
line.’ The protection of individual rights and freedoms is of utmost importance and has
often be aligned more with a liberal perspective.
3.0 CONCLUSION
There are several pros and cons to both models; however, there are certain groups and individuals
that side with one more often than the other. The crime control model is used when promoting policies that
allow the system to get tough, expand police powers, change sentencing practices such as creating “Three
Strikes,” and more. The due process model may promote policies that require the system to focus on
individual rights.
4.0 SUMMARY.
The crime control model is considered to be a conservative approach to crime that focuses on
protecting society from criminals by regulating criminal conduct and justice. In contrast, the due process
model is considered to be a liberal approach to criminal justice that favors criminal rights.
5.0 ASSIGNMENT.
Discuss what the primary goal of the criminal justice system should be: to control crime, ensure due
process, or both? Explain how this opinion may get influenced by individual factors, such as age,
gender/sex, race/ethnicity, economic situation, a country born in, and more.
6.0 REFERNCES
a) Packer, H. (1964). Two models of the criminal process. 8QLYHUVLW\RI3HQQV\OYDQLD/DZ5HYLHZ
(1) տ
b) The psychology of law by Isaac Christopher Lubogo 2022 by Jescho publications
UNIT 5: THE METHODS USED TO STUDY THE PSYCHOLOGICAL
ASPECTS OF THE JUSTICE.
CONTENTS
1.0 Introduction
2.0 Main content
a) Biological explanations
b) Behavioral research
c) Cognitive approach
d) Subjective approach
3.0 Conclusion
4.0 Summary
5.0 Assignments
6.0 References
1.0 INTRODUCTION
A psychological approach focuses on individuals as agents withing a legal system, asking how their
internal qualities (personality, values, abilities, and experiences) and their environment, including the law
itself, affect their behavior
2.0 MAIN CONTENT
D Biological explanations are based on knowledge of living cells and organic systems. Brain scanning
technologies are now commonly used in psychological research. Scientists also have increasingly
detailed knowledge of cell interactions, chemical influences on the nervous system, and
brain/behavior relationships.
E Behavioral research emphasizes actions (behaviors). Behaviorists typically relate actions to the
organism's environment and history of learning. The environment, to a behaviorist, is any situation
or stimulation that can be measured. Field research on animals is an example of behavioral research.
So is intensive behavior therapy with autistic children, one of the most effective treatments for autism.
F Cognitive approaches stress information processing. Cognitive psychologists study the interactions
of thoughts, images, knowledge, and emotions. The brain is often compared to a computer. If the
brain is analogous to hardware (a physical system), cognitive psychology studies the operation of
the software: patterns of information processing in the brain.
G Subjectiveapproaches describe unique thoughts, feelings, and experiences of individuals. This can
also be called SKHQRPHQRORJ\
3.0 CONCLUSION
All four perspectives are relevant to almost all areas of psychology. Anxiety, for example, can be studied
as a biological response, a set of behaviors, a thought process, or an experience. Psychology is by
nature an integrative science, employing a variety of perspectives on the same events.
4.0 SUMMARY
A psychological aspect may be the cognitive and emotional benefits conveyed by different options of
performing mobility
5.0 ASSIGNMENT
a) Why is memory a relevant topic when considering cognitive psychology and law?
6.0 REFERENCES
a) The psychology of law by Isaac Christopher Lubogo 2022 by Jescho publications