<div>Good morning,</div>
<div>The overall objective of a national cyber security strategy is to protect the confidentiality, integrity and availability of information.</div>
<div>The provisions contained in the KCA (amendment) Act, 2009 represent the primary threats that keep an organisation from attaining its goals. Cyber security strategy should be part of any organisation's overall asset protection program. The goals and objectives should be understood by all employees.</div>
<div>From an information security professional point of view, it is important to understand and provide organisational guidance with respect to the computer crime laws that relate to your operation. These can ofcourse be only the laws of your country or if your organisation operates in a multinational environment, can include laws of other countries.</div>
<div>An important part of information security consists of interpreting the law for top management and instituting policy and procedures designed to keep the organisation and its employees from violating the law.</div>
<div>Regarding,crimes commited across border, in some cases countries are requesting the extradiction of computer hackers who have never physically entered the country whose laws they�have allegedly broken. Unfortunately, evidence rules generally differ in various legal systems,which poses other problems in the evidence collection approach.</div>
<div>�</div>
<div>Evans<br><br></div>
<div class="gmail_quote">On Tue, May 5, 2009 at 4:42 PM, mwende njiraini <span dir="ltr"><<a href="mailto:mwende.njiraini@gmail.com">mwende.njiraini@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Good morning!</font></span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif"></font></span>�</div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font size="+0"><font face="arial,helvetica,sans-serif">Today we continue to build on previous discussions on cybersecurity, with a view of seeking your contributions in the development a national cyber-security strategy.<span>� </span></font></font></span></div>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">�</font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">The Kenya Communications (Amendment) Act, 2009 (<a href="http://www.communication.go.ke/media.asp?id=775" target="_blank">http://www.communication.go.ke/media.asp?id=775</a>) contains the following provisions with regard to cybersecurity: </font></span></p>
<ul style="MARGIN-TOP: 0cm" type="disc">
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unauthorized access to computer data, </font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Access with intent to commit offences</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unauthorized access to and interception of computer service, </font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unauthorized modification of computer material,</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Damaging or denying access to computer system,</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unauthorized disclosure of password,</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unlawful possession of devices and data,</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Electronic fraud, </font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Tampering with computer source documents,</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Publishing of obscene information in electronic form,</font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Publication for fraudulent purpose and </font></span></li>
<li style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Unauthorized access to protected systems</font></span></li></ul>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">�</font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">Harry Delano (email 29<sup>th</sup> April) <span lang="EN-US"><font face="Times New Roman" size="3">�<font face="arial,helvetica,sans-serif" size="2">Are our cybersecurity regulations (law) up to the task, to protect us...?�</font></font></span></font></span></p>
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">�</font></span></p>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"><font face="arial,helvetica,sans-serif">In answering this question we may wish to consider the issue of jurisdiction, the ability of the judicial system to make a ruling with regards to a crime committed through the internet by extra-territorial elements and secondly the role of arbitration as an Alternative Dispute Resolution (ADR) mechanism (<a href="http://www.ciarbkenya.org/" target="_blank">http://www.ciarbkenya.org/</a>).</font></span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"></span>�</div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US">Kind regards</span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US">Mwende</span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"></span>�</div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US">
<p style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><i><span lang="EN-US"><font size="3"><font face="Times New Roman">Disclaimer: Views expressed here (apart from those quoted/referenced)�are the author�s own</font></font></span></i></p>
</span></div>
<div style="MARGIN: 0cm 0cm 0pt; TEXT-ALIGN: justify"><span lang="EN-US"></span>�</div><br>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="http://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">http://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br><br>This message was sent to: <a href="mailto:ifani.kinos@gmail.com">ifani.kinos@gmail.com</a><br>
Unsubscribe or change your options at <a href="http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com" target="_blank">http://lists.kictanet.or.ke/mailman/options/kictanet/ifani.kinos%40gmail.com</a><br>
<br></blockquote></div><br>