<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Thank you, Evans and Judy for your contributions to today’s discussion.<span style="mso-spacerun: yes"> </span></span></font></div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><font face="arial,helvetica,sans-serif"><span lang="EN-US"><span style="mso-spacerun: yes"></span></span></font> </div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><font face="arial,helvetica,sans-serif"><span lang="EN-US"><span style="mso-spacerun: yes"></span>Privacy is usually not a concern until one encounters an infringement.</span></font></div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><font face="arial,helvetica,sans-serif"><span lang="EN-US"></span></font> </div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><font face="arial,helvetica,sans-serif"><span lang="EN-US">For example theft and misuse of personal information held the government, your bank, school, employer, local supermarket, etc may result in irritating phone calls/emails from a telemarketing agents who have gained access to your shopping patterns through loyalty cards or a surprise phone call from a long lost friend who has just seen your photo in an online version of ‘fashion police’</span><span lang="EN-US" style="FONT-FAMILY: Wingdings; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-char-type: symbol; mso-symbol-font-family: Wingdings"><span style="mso-char-type: symbol; mso-symbol-font-family: Wingdings">J</span></span><span lang="EN-US">!</span></font></div>
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><span style="mso-spacerun: yes"><font face="arial,helvetica,sans-serif"> </font></span></span></p>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unfortunately, most citizens do not have the time or money to start legal proceedings in this regard.<span style="mso-spacerun: yes"> </span>Consequently, ‘social engineering’ has been proposed as the best method to overcome the challenges associated with infringement of privacy.<span style="mso-spacerun: yes"> </span>This involves exercising your right to opt-in or out, carefully reading privacy policies and end user agreements.</font></span></div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"></span> </div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US">Further discussion on this topic is most welcome! </span></div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="arial,helvetica,sans-serif"></font></span> </div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Kind regards</span></font></span></div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US">Mwende</span></font></span></div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US"></span></font></span> </div>
<div class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><span lang="EN-US"><font face="arial,helvetica,sans-serif"><span lang="EN-US">
<p class="MsoNormal" style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify; mso-layout-grid-align: none"><i style="mso-bidi-font-style: normal"><span lang="EN-US"><font size="3"><font face="Times New Roman">Disclaimer: Views expressed here are the author’s own</font></font></span></i></p>
</span></font></span></div><br><br>
<div class="gmail_quote">On Mon, May 4, 2009 at 9:57 PM, Judy Okite <span dir="ltr"><<a href="mailto:judyokite@gmail.com">judyokite@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">First- We need to create a culture of reading the terms and<br>conditions....on the websites.....that is always the first defense and<br>
that's why they have it there.<br><br>on the other hand - Your personal information being out there,without<br>your consent...is another thing altogether!<br><br>Secondly- a lot of capacity building(lack of a better word) is<br>
needed...as far as sharing personal information online is<br>concerned....from as early as introduction to internet ....whatever<br>kind of information,that is online, just make sure you will still be<br>proud of it 10 years to come, this will define you...whether its true<br>
or false....your have just created your online profile!<br><br><br>Kind Regards,<br>
<div>
<div></div>
<div class="h5"><br>On 5/4/09, Evans Kahuthu <<a href="mailto:ifani.kinos@gmail.com">ifani.kinos@gmail.com</a>> wrote:<br>> The purpose of Information Security/Cybersecurity is to protect an<br>> organizations's valuable resources, such as information, hardware and<br>
> software. Through the selection and application of appropriate safeguards,<br>> Information Security helps the organization's mission by protectiing its<br>> physical and financial resources, reputation, legal position, employees, and<br>
> other tangible and intangible assets.<br>> The issue of cybersecurity/Information security simply comes down to three<br>> things: 1) Confidentiality, 2) Integrity and Availability.<br>> Information Security management/cybersecurity entails the identification of<br>
> an organisation's information assets and developemt, documentation, and<br>> implementation of policies, standards, procedures and guidelines, which<br>> ensure their Confidentiality, Integrity and Availability.<br>
> Unfortunately, cybersecurity is sometimes viewed as hindering the mission of<br>> the organisation by impossing poorly selected bothersome rules and<br>> procedures on users, managers and systems. On the contrary, if well<br>
> implemented, Cybersecurity rules and procedures can support the overall<br>> organisational mission.<br>> In the case of Kenya, the way to create a culture of cybersecurity is<br>> through management tools such as data classification, security awareness<br>
> traininig, risk assesment and risk analysis in order to identify threats,<br>> classify assets, and rate their vulnerabilities so that effective security<br>> controls can be implemented.<br>><br>> Regards,<br>
> Evans<br>><br>><br>> On Sun, May 3, 2009 at 10:59 PM, mwende njiraini<br>> <<a href="mailto:mwende.njiraini@gmail.com">mwende.njiraini@gmail.com</a>>wrote:<br>><br>>> Good morning,<br>>><br>
>><br>>><br>>> The focus of our discussion this week is on cybersecurity and trust. We<br>>> will seek to address privacy and data security issues.<br>>><br>>><br>>><br>>> Like many other Kenyans, we frequently register to use various online<br>
>> services provided by the government and businesses. The registration<br>>> process requires that we provide personal information including physical,<br>>> postal address, telephone numbers, credit card numbers, etc. The younger<br>
>> generation and the young-at-heart are readily sharing “personally<br>>> identifiable information” including photos and events through social<br>>> networking sites including facebook, youtube, myspace, flickr, twitter,<br>
>> etc.<br>>><br>>><br>>><br>>> Personal information collected and made available in the public domain<br>>> such<br>>> as the electoral register, telephone directory can be combined with<br>
>> information for example from supermarkets loyalty cards to create<br>>> valuable<br>>> market information to track individual preferences and purchase<br>>> profiles.<br>>> This information may unfortunately be subject to abuse and theft.<br>
>> Consequently, ‘trust’ in policies and the security measures that the<br>>> government and businesses establish to protect user information is<br>>> therefore<br>>> an essential element for the success of e-transactions (both e-government<br>
>> and e-commerce)<br>>><br>>><br>>><br>>> - How can we create a cyber security culture in Kenya? What is the role<br>>> of the educators, peers and parents in digital literacy with respect to<br>
>> privacy and security?<br>>> - Does the current legal environment provide for the protection of<br>>> privacy on the internet? How can we establish a balance between<br>>> security<br>>> and right to privacy?<br>
>><br>>> Looking forward to hearing from you.<br>>><br>>><br>>><br>>> Kind regards<br>>><br>>> Mwende<br>>><br>>><br>>><br>>> References<br>>><br>
>> 1. Protecting your Privacy on the Internet:<br>>> <a href="http://privacy.gov.au/internet/internet_privacy/index.html#2" target="_blank">http://privacy.gov.au/internet/internet_privacy/index.html#2</a><br>
>><br>>> 2. Privacy Policies: <a href="http://www.facebook.com/policy.php?ref=pf" target="_blank">http://www.facebook.com/policy.php?ref=pf</a>,<br>>> <a href="http://twitter.com/privacy" target="_blank">http://twitter.com/privacy</a><br>
>><br>>> 3. Article 12 of the Universal Declaration of Human Rights :<br>>> <a href="http://www.un.org/en/documents/udhr/index.shtml#a12" target="_blank">http://www.un.org/en/documents/udhr/index.shtml#a12</a><br>
>><br>>> 4. Office of the Privacy Commissioner of Canada: Protecting Your<br>>> Privacy on the Internet: <a href="http://www.priv.gc.ca/fs-fi/02_05_d_13_e.cfm" target="_blank">http://www.priv.gc.ca/fs-fi/02_05_d_13_e.cfm</a><br>
>><br>>> 5. Privacy illustrations:<br>>> <a href="http://www.priv.gc.ca/information/illustrations/index_e.cfm" target="_blank">http://www.priv.gc.ca/information/illustrations/index_e.cfm</a><br>>><br>
>> 6. <a href="http://www.diplomacy.edu/ISL/IG/" target="_blank">http://www.diplomacy.edu/ISL/IG/</a><br>>><br>>><br>>><br>>> *Disclaimer: Views expressed here are the author’s own*<br>>><br>
>> _______________________________________________<br>>> kictanet mailing list<br>>> <a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>>> <a href="http://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">http://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
>><br>>> This message was sent to: <a href="mailto:ifani.kinos@gmail.com">ifani.kinos@gmail.com</a><br>>> Unsubscribe or change your options at<br>>> <a href="http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com" target="_blank">http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com</a><br>
>><br>>><br>><br><br><br></div></div>--<br>"Each of us is great insofar as we perceive and act on the infinite<br>possibilities which lie undiscovered and unrecognized about us." James<br>Harvey Robinson<br>
<div class="im"><br>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br><a href="http://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">http://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br></div>This message was sent to: <a href="mailto:mwende.njiraini@gmail.com">mwende.njiraini@gmail.com</a><br>Unsubscribe or change your options at <a href="http://lists.kictanet.or.ke/mailman/options/kictanet/mwende.njiraini%40gmail.com" target="_blank">http://lists.kictanet.or.ke/mailman/options/kictanet/mwende.njiraini%40gmail.com</a><br>
</blockquote></div><br>