Resilience. Recovery. Contingency. Dependable. Planning
As cyber crime rises exponentially and cybercriminals find new ways to gain unlawful access into corporate infrastructures in all industries, organizations are often at loss at what to do.
New software vulnerabilities are found daily, web applications attacks leave websites vulnerable and viruses becomes increasingly silent and stealthy. Often, the simplest things such as weak passwords and uneducated staff can be the cause of an entire company infrastructure being compromised.
This is done in a variety of ways including attacks and penetration testing, web application assessments, vulnerability assessments, training, and keeping your company constantly safe with a month-to-month service level agreement.
Cyber Security Offences According to Botswana’s constitution
- Unauthorised access to computer service
- Access with intent to commit an offence
- Unauthorised interference with data
- Unauthorised interference with a computer or computer system
- Unlawful interception of data
- Unlawful possession of devices or data
- Unauthorised disclosure of password
- Damage to a computer or computer system
- Protected computers
- Cyber extortion
- Cyber fraud
- Electronic traffic in pornographic or obscene material
- Unlawful disclosure by service provider
- Parties to an offence
- Unauthorised access to a computer or computer system
Reservation of Rights
We reserve the right to request that you remove all links or any particular link to our Website. You approve to immediately remove all links to our Website upon request. We also reserve the right to amen these terms and conditions and it’s linking policy at any time. By continuously linking to our Website, you agree to be bound to and follow these linking terms and conditions.
Removal of links from our website
If you find any link on our Website that is offensive for any reason, you are free to contact and inform us any moment. We will consider requests to remove links but we are not obligated to or so or to respond to you directly.
We do not ensure that the information on this website is correct, we do not warrant its completeness or accuracy; nor do we promise to ensure that the website remains available or that the material on the website is kept up to date.
T he courts of Botswana shall have jurisdiction where an act done or an omission made
constituting an offence under this Act has been committed-
( a) i n the territory of Botswana;
( b) by a national of Botswana outside the territory of Botswana, if the person’s conduct
would also constitute an offence under the law of the country where the offence was
committed and if the person has not been prosecuted for the offence in that country;
( c) on a ship or aircraft registered in Botswana;
( d) i n part in Botswana; or
( e) outside the territory of Botswana and where any result of the offence has an effect in Botswana.
<p>To the maximum extent permitted by applicable law, we exclude all representations, warranties and conditions relating to our website and the use of this website. Nothing in this disclaimer will:</p>
<li>limit or exclude our or your liability for death or personal injury;</li>
<li>limit or exclude our or your liability for fraud or fraudulent misrepresentation;</li>
<li>limit any of our or your liabilities in any way that is not permitted under applicable law; or</li>
<li>exclude any of our or your liabilities that may not be excluded under applicable law.</li>
<p>The limitations and prohibitions of liability set in this Section and elsewhere in this disclaimer: (a) are subject to the preceding paragraph; and (b) govern all liabilities arising under the disclaimer, including liabilities arising in contract, in tort and for breach of statutory duty.</p>
<p>As long as the website and the information and services on the website are provided free of charge, we will not be liable for any loss or damage of any nature.</p>
An Act to combat cybercrime and computer related crimes, to repress criminal activities perpetrated through computer systems and to facilitate the collection of electronic evidence.
In this section, a “protected computer” means a computer or computer system or programme or data used directly in connection with, or necessary for-
(a) the security, defence or international relations of Botswana;
(b) the existence or identity of a confidential source of information relating to the
enforcement of a criminal law;
(c) the provision of services directly related to communications infrastructure, banking
and financial services, public utilities, public transportation or public key infrastructure;
( d) the protection of the public, including systems related to national emergency
A police officer or any person authorised by the Commissioner or by the Director, in writing, may, by written notice, order for the preservation of data that has been stored or processed by means of a computer or computer system or any other information and communication technology, where there are reasonable grounds to believe that such data is vulnerable to loss or modification.
( 2) For the purposes of subsection (1), data includes traffic data and subscriber information
A police officer or any person authorised by the Commissioner or by the Director, in writing, may apply to a judicial officer, ex parte, for an order-
(a) for the collection or recording of traffic data, in real time, associated with specified communications transmitted by means of any computer or computer system; or
(b) compelling a service provider, within its technical capabilities, to-
( i) effect such collection and recording referred to in subparagraph (ii) assist the Police, to effect such collection and recording.
( 1) Data obtained under this Act by a police officer, or any person authorised by the Commissioner or by the Director, in writing, shall be used for the purpose for which the data was originally sought, unless such data is sought-
( a) in accordance with any other enactment;
( b) in compliance with an order of court;
( c) in the prevention of injury or other damage to the health of a person or serious loss of or damage to property; or
( d) in the public interest.
( 2) Subject to subsection (3), on request, a police officer or any person authorised by the Commissioner or by the Director, in writing, shall permit a person who had the custody or control of a computer or computer system to access and copy computer data on the computer or computer system.
( 3) A police officer or any person authorised by the Commissioner or by the Director, in writing, may refuse to give access to computer data or provide copies of such computer data if he or she has reasonable grounds for believing that giving access, or providing the copies-
( a) would constitute a criminal offence; or
( b) would prejudice-
( i) the investigation in connection with which the search was carried out; or
(ii) another ongoing investigation; or
( iii) any criminal proceedings that are pending or that may be brought in relation to
any of those investigations.