Home » Blog » Securing the Digital Frontier: A Critical Analysis of Legislative Gaps in Ethiopia’s Cyber Security Regime

Securing the Digital Frontier: A Critical Analysis of Legislative Gaps in Ethiopia’s Cyber Security Regime

Authored By: Betelhem Tikue Hailu

Abstract 

Ethiopia‟s “Digital Ethiopia 2025” agenda is accelerating digital transformation, but cyber  security law and institutions remain underdeveloped. While the Personal Data Protection  Proclamation No. 1321/2024 marks progress, key gaps persist. The Computer Crime  Proclamation No. 958/2016 is outdated, no comprehensive cyber security law exists, critical  infrastructure lacks protection, and incident response mechanisms are weak. This article argues  that closing these gaps through legal and institutional reform is essential to safeguard citizens,  businesses, and state systems, and to secure the success of Ethiopia‟s digital ambitions. 

  1. Introduction 

Ethiopia’s rapid digital growth, driven by telecom liberalization, mobile money, and digital ID  programs, is central to its “Digital Ethiopia 2025” strategy.1 However, this progress has also  increased exposure to cyber threats like ransom ware, data breaches, and infrastructure attacks.  Recent incidents, including attempted cyber-attacks on the Grand Ethiopian Renaissance Dam2 and a major data breach at the Commercial Bank of Ethiopia3, highlight the critical gap between  technological adoption and legal readiness. 

While Ethiopia has foundational laws such as the Computer Crime Proclamation No. 958/2016,  its legal framework remains fragmented and reactive. The recent Personal Data Protection  Proclamation No. 1321/2024 marks significant progress but addresses only one aspect of cyber  security. This article argues that Ethiopia‟s current legal regime lacks the comprehensive and  proactive measures needed to ensure digital security. It will analyze legislative developments, identify key vulnerabilities, and propose a clear path forward to safeguard Ethiopia‟s digital  future. 

  1. Research Methodology 

This article employs a doctrinal and analytical research methodology. The analysis is grounded  in a systematic review of primary legal sources, including Ethiopian proclamations and official  government reports. The approach integrates case studies of recent cyber incidents to bridge  theory with practice. 

3.1. The Existing Legal Framework: A Patchwork of Provisions 

Ethiopia‟s digital law landscape has evolved from a narrow focus on criminal sanction towards a  more nuanced, though still incomplete, regulatory approach. 

The cornerstone of cybercrime regulation remains the Computer Crime Proclamation No.  958/2016.4This law criminalizes essential offences such as unauthorized access5, data  interference6, and system interference7. While a significant improvement over its 2001  predecessor, the proclamation functions primarily as a penal code. It lacks detailed provisions on  emerging threats like ransom ware-as-a-service and creates no positive obligations for  organizations to implement cyber security measures. 

The most significant recent development is the Personal Data Protection Proclamation No.  1321/2024.This landmark legislation establishes a legal basis for data security. It imposes a  direct obligation on data controllers and processors to implement “appropriate technical and  organizational measures” to ensure a level of security commensurate with the risk.8This creates  a statutory duty of care for data security, violation of which could lead to administrative  sanctions from the newly established Ethiopian Data Protection Commission. 

3.2. Critical Analysis: Identifying the Legislative Gaps 

3.2.1. The Absence of a Comprehensive Cyber security Law 

Ethiopia‟s most significant weakness is the lack of a dedicated, overarching cyber security law.  There is no legislation that establishes a national cyber security strategy, defines the roles and  responsibilities of different government entities, or mandates the creation of a formal national  Computer Emergency Response Team (CERT).9This contrasts with regional peers like Kenya,  which enacted a specific Cyber security Act in 2024.10The current approach spreads  responsibilities thinly across various laws without central coordination, leading to inefficiency  and gaps in national defense.11 

3.2.2. Inadequate Protection for Critical Information Infrastructure (CII) A profound vulnerability is the lack of a legal process for identifying and securing CII. Vital  systems such as national power grids, financial market infrastructures, and telecommunications  networks operate without legally mandated, risk-based cyber security standards. The 2022  attempted cyber-attacks on the GERD12 exemplify this threat. The Data Protection Proclamation  applies to personal data, but it does not cover the operational technology and industrial control  systems that underpin CII, leaving a crucial aspect of national security unregulated. 

3.2.3. Weak Mandatory Incident Reporting and Response 

While the Data Protection Proclamation introduces a data breach notification requirement to the  Data Protection Commission, a broader, mandatory incident reporting system for significant  cyber-attacks across all sectors is absent. The lack of a centralized CERT (Computer Emergency  Response Team) means there is no single, specialized body to coordinate national responses to  major cyber incidents, share threat intelligence, or provide technical assistance to vulnerable  entities. This hinders national situational awareness and a cohesive response. 

3.3. Bridging Theory and Practice: Case Studies in Legislative Inadequacy 

Case Study : The Commercial Bank of Ethiopia Data Incident (2024) In 2024, the CBE publicly disclosed the names and photographs of individuals allegedly  involved in unauthorized withdrawals following a system glitch.13 This action sparked  widespread condemnation as a violation of customer privacy. It is crucial to note that this  incident occurred before the enactment of the Personal Data Protection Proclamation No.  1321/2024. Therefore, it does not demonstrate a failure of that new law but rather serves as a  powerful illustration of the legal vacuum that existed and the pressing need for a robust data  protection regime. It highlights the practical consequences of unclear accountability and the  absence of an active data authority. 

  1. Suggestions / Way Forward 

To effectively secure its digital ecosystem, Ethiopia should pursue the following reforms:

Enact a Dedicated Cyber security Law: This law should establish a national cyber  security agency, define and create a registry for CII, and mandate the creation of a  national CERT as a central hub for incident response and threat intelligence sharing.14

Develop Sector-Specific Regulations: Sector regulators (e.g., National Bank of Ethiopia  for finance) should be empowered to issue detailed cyber security regulations based on  the risk profiles of their industries, building on the model of the Payment System  Proclamation. 

Operationalize the Data Protection Commission: The government must ensure the  newly established Data Protection Commission receives adequate funding and technical  expertise to effectively monitor compliance and enforce the data security mandates of  Proclamation No. 126/2024. 

Modernize Criminal Procedure: The Criminal Procedure Code and laws of evidence  should be updated to explicitly address the collection, preservation, and admissibility of  digital evidence, enhancing the judiciary’s capacity to handle cybercrime cases. 

  1. Conclusion 

Ethiopia‟s digital ambition is promising but fragile. Despite progress with the Data Protection  Proclamation, the legal framework remains fragmented and unfit for 21st-century cyber threats.  Gaps in strategy, critical infrastructure protection, and incident response pose systemic risks to  “Digital Ethiopia 2025.” The priority now is a cohesive, proactive framework to secure the  digital future, protect the economy, and uphold citizens‟ rights. 

  1. References 

„CBE reports massive cyber-attack attempts amid internal glitch causing loss of millions of birr‟ Addis standard (March 19, 2024) 

Computer Crime Proclamation No. 958/2016, Federal Negarit Gazeta of the Federal Democratic  Republic of Ethiopia, 21st Year No. 56 (2016). 

‘Cyber-attack Attempts on Grand Ethiopian Renaissance Dam Thwarted’ Ethiopian Monitor (3  May 2022). 

Cybersecurity Act, No. 18 of 2024 (Kenya). 

‘Digital Ethiopia 2025 Strategy’ (Ethiopian Ministry of Innovation and Technology, 2020). ‘INSA Foils Over 6,700 Cyber-attack Attempts’ Ethiopian Monitor (24 July 2023). Kibreab A Dane, ‘The Current Status of Cyber Security in Ethiopia’ (ResearchGate, 12 May 2022) 

Markos, Yabets, Cyber Security Challenges that Affect Ethiopia‟s National Security (Addis  Ababa University School of Graduate Studies, Department of Political Science and  International Relations,  

Personal Data Protection Proclamation No. 1321/2024, Federal Negarit Gazeta of the Federal  Democratic Republic of Ethiopia, 30th Year No. 14 (2024). 

The Invisible Battlefield: Analyzing Cybersecurity Threats and Their Implications on Ethiopian  National Security (2013-2023) 

1‘Digital Ethiopia 2025 Strategy’ (Ethiopian Ministry of Innovation and Technology, 2020).

2‘From Megawatts to Malware: Why cybersecurity holds key to securing Ethiopia’s GERD’ Addis Standard (September 2025 

3‘Rights groups challenge CBE’s ‘name and shame’ policy, describe it as a ‘violation of privacy law” Addis Standard (13 June 2024).

4Computer Crime Proclamation No. 958/2016, Federal Negarit Gazeta of the Federal Democratic Republic of  Ethiopia, 21st Year No. 56 (2016). 

5Article 4 of Computer Crime Proclamation No 958/2016 

6Article 5 of Computer Crime Proclamation No 958/2016 

7Article 6 of Computer Crime Proclamation No 958/2016 

8Article 16 and 17 of the Personal Data Protection Proclamation No. 1321/2024.

9Kibreab A Dane, ‘The Current Status of Cyber Security in Ethiopia’ (12 May 2022) 

10 Cyber security Act, No. 18 of 2024 (Kenya). 

11 Kibreab A Dane, ‘The Current Status of Cyber Security in Ethiopia’ (ResearchGate, 12 May 2022)

12‘Cyber-attack Attempts on Grand Ethiopian Renaissance Dam Thwarted’ Ethiopian Monitor (3 May 2022).

13 ‘CBE reports massive cyber-attack attempts amid internal glitch causing loss of millions of birr’ Addis standard  (March 19, 2024) 

14 INSA’s mission is to protect Ethiopia’s national interest by building a capability that enables to safeguard the  country’s information and information infrastructures. All of it, within the values of Resilience, Making Difference,  Integrity, Respect for the people and Respect for the law.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top