I happen to be in the communications committee of ISACA Kenya, and we try to publicize our organisation as much as possible, through outreach in Universities, and conferences. As a matter of fact, to be employed as an information security analyst, you must possess one of our certifications. Many people might never have heard about ISACA Kenya, but they know CISA, CISM, CGEIT, CRISC, and COBIT professional courses, which are administered and maintained by ISACA. We have a website <a href="http://www.isaca.or.ke" target="_blank">www.isaca.or.ke</a>, and FB page <a href="http://www.facebook.com/ISACAKenya" target="_blank">http://www.facebook.com/ISACAKenya</a>, and a twitter handle <a href="https://twitter.com/Isaca_kenya" target="_blank">https://twitter.com/Isaca_kenya</a>.<div>
<br></div><div>Now from the shameless advertising, IEBC on 16th Feb 2013 called for information security experts to audit their systems, although the call came very late. Below is what they required.</div><div><br><div><div>
<span style="font-size:13px;font-family:arial,sans-serif">Dear ISACA Member</span><br style="font-size:13px;font-family:arial,sans-serif"><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">"The Independent Electoral and Boundaries Commission ("IEBC"), through</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">one of its development partners, is seeking the service of an expert</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">information security professional to conduct an end-to-end to</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">information security testing of its electoral systems that will be</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">used to transmit and present provisional electoral results in the 4th</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">March 2013 general election. The specific terms of reference for this</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">immediate short-term appointment are:</span><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">Perform a security testing against well-known industry best practices</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">and standards:</span><br style="font-size:13px;font-family:arial,sans-serif"><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Back-end running on a Windows Server and/or Unix/Linux OS</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Network – dedicated VPN over GPRS/GSM/2G/3G and private WLAN</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Front-end comprises custom mobile app on Java-enabled handheld devices.</span><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">Interface of the RTS with other electoral systems</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Other relevant activities consistent with the assignment.</span><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">Deliverables:</span><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">Interim and final reports with specific action points, clearly</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">pointing out the risk if not addressed.</span><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">Due to the short procurement cycle, expressions of interested are</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">invited for immediate consideration from experience and skilled IT</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">security professionals who must be current holders of CISSP/CISM/CISA</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">or equivalent. Membership to professional bodies in good standing</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">required. Individual consultants are particularly encouraged to</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">respond.</span><br style="font-size:13px;font-family:arial,sans-serif"><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Duration of Engagement: 10 – 15 working days, starting ASAP, but not</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">later than 21/02/2013. Please include your daily professional rates</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">for this type of engagement.</span><br style="font-size:13px;font-family:arial,sans-serif"><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Closing Date: Applications must be received not later than Monday,</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">February 18, 2013 at 5pm.</span><br style="font-size:13px;font-family:arial,sans-serif"><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Please send applications to </span><a href="mailto:kenyapa@ifes.org" style="color:rgb(17,85,204);font-size:13px;font-family:arial,sans-serif" target="_blank">kenyapa@ifes.org</a><span style="font-size:13px;font-family:arial,sans-serif">, with a copy to:</span><br style="font-size:13px;font-family:arial,sans-serif">
<a href="mailto:dongondi@iebc.or.ke" style="color:rgb(17,85,204);font-size:13px;font-family:arial,sans-serif" target="_blank">dongondi@iebc.or.ke</a><span style="font-size:13px;font-family:arial,sans-serif">. Please include "Application to Provide</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">Information Security Services" in the subject line to ease sorting.</span><br style="font-size:13px;font-family:arial,sans-serif">
<br style="font-size:13px;font-family:arial,sans-serif"><span style="font-size:13px;font-family:arial,sans-serif">If you are interested and meet the requirements please send your</span><br style="font-size:13px;font-family:arial,sans-serif">
<span style="font-size:13px;font-family:arial,sans-serif">application ASAP to the email addresses above.</span></div><div><font face="arial, sans-serif"><br></font></div><div><font face="arial, sans-serif">Regards</font></div>
<div><font face="arial, sans-serif">Mwendwa Kivuva (lordmwesh)</font></div><div><br><div class="gmail_quote">On 13 March 2013 10:17, Harry Delano <span dir="ltr"><<a href="mailto:harry@comtelsys.co.ke" target="_blank">harry@comtelsys.co.ke</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Hey Walu,<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Very pertinent issues, these that you have raised.<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Looking at the Framework we have ,it’s tough to see how we can sufficiently address the issue we have at hand. At best we can only rely on what IEBC will willingly share.. But we cannot<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">compel them to do so. It is an independent body. Who has oversight on independent bodies, other than the Judiciary..? At best Judiciary will also have to rely on evidence. Who produces<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">credible high quality tech evidence..?<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Your response came in while I was mulling the idea of mooting a national IS ( Information Systems) Task force – maybe to be named KISTF (Kenya Information Systems Task Force). This is<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">in cognizance of the fact most systems are going digital in this information age and without any independent supervisory framework, we may have real issues handling the ensuing mayhem.<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">This body should have the capacity/powers to deal with/oversee/audit – National IS systems – The procurement process, implementation and operational matters as well as audits and ensure <u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">good governance etc.<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">In fact now that we are aware that such an issue as the debacle at IEBC would come back and bite us hard ( We the ICT fraternity), it is incumbent upon us to lobby to be put in place the legal <u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">framework that paves way for such a taskforce that should be independent, professional, impartial, credible and with a national outlook, and of course.<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Where can we start..? Secretariat..?<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Regards,<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Harry<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p>
<div><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in 0in 0in"><p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> kictanet [mailto:<a href="mailto:kictanet-bounces%2Bharry" target="_blank">kictanet-bounces+harry</a>=<a href="mailto:comtelsys.co.ke@lists.kictanet.or.ke" target="_blank">comtelsys.co.ke@lists.kictanet.or.ke</a>] <b>On Behalf Of </b>Walubengo J<br>
<b>Sent:</b> Wednesday, March 13, 2013 9:24 AM<br><b>To:</b> <a href="mailto:harry@comtelsys.co.ke" target="_blank">harry@comtelsys.co.ke</a></span></p><div><br><b>Cc:</b> KICTAnet ICT Policy Discussions<br></div>
<b>Subject:</b> Re: [kictanet] Our Response to Systematic ICT Systems Failure at IEBC-just fix the laws/regulatory framework<u></u><u></u><p></p></div></div><div><div><p class="MsoNormal"><u></u> <u></u></p><div>
<p class="MsoNormal" style="background:white"><span>Edith,<br><br>In Kenya there is NO explicit and compelling legal framework for auditing Information Systems. The Kenya Comm. Act 2009 comes close but is too general and restricted to telcos. Furthermore the details of how these telcos are supposed to maintain security and integrity of their Infor systems is <b>correctly</b> left out since this does require and independent and substantive standolone legislation that touches on the role of an IT savvy Judiciary, IT Savvy Prosecution, IT Savvy Investigators/Law Enforcement and IT Savvy Organisastional Requirments (e.g being compelled to do regular and report on IS Audits - more like we do for the Financial Audits). So that is the ecosystem/framework that needs to kick in to guarantee us some semblance of a secure information system landscape/knowledge industry.<br>
<br>Serious companies (mainly blue chip banking, insurance, telcos, etc) do Info System Audit either as best practice or as directed by their foreign Headquarters' legal requirements. US/EU/Australia have specific laws compelling companies to annually do and report on their Information Systems Governance, Risks and Assurance.<br>
<br>In Kenya the closest we have come to having this framework is through the repeated and still continuing attempts to have the Data Protection Bill, the Freedom of Information Bill as well last years CCKs discussions on eCommerce Regulations in palce. In all these exercises ISACA-Kenya (<a href="http://www.isaca.or.ke" target="_blank">www.isaca.or.ke</a>) which is the local chapter for the international (<a href="http://www.isaca.org" target="_blank">www.isaca.org</a>) that deals with Information Systems Governance, Risks and Assurance has been participating. So my take going forward is just fix these laws and regulations and we can save ourselves the next election fiasco in 2017.<br>
<br>Your never having heard of them (ISACA-Kenya) is because "tunatenda bila kusema" (we do without saying :- ) just to rephrase the now famous slogan.<br><br>walu.<br><br> <u></u><u></u></span></p><div><p class="MsoNormal" style="background:white">
<span><u></u> <u></u></span></p></div><div><div><div><div class="MsoNormal" align="center" style="text-align:center;background:white"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><hr size="1" width="100%" align="center">
</span></div><p class="MsoNormal" style="background:white"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Arial","sans-serif""> Edith Adera <<a href="mailto:eadera@idrc.ca" target="_blank">eadera@idrc.ca</a>><br>
<b>To:</b> Walubengo J <<a href="mailto:jwalu@yahoo.com" target="_blank">jwalu@yahoo.com</a>> <br><b>Cc:</b> KICTAnet ICT Policy Discussions <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>> <br>
<b>Sent:</b> Tuesday, March 12, 2013 9:53 PM<br><b>Subject:</b> RE: [kictanet] Our Response to Systematic ICT Systems Failure at IEBC</span><span><u></u><u></u></span></p></div><p class="MsoNormal" style="margin-bottom:12.0pt;background:white">
<span><br>Walu,<br><br>What is the legal and institutional framework for auditing such mega systems for public use? which is the standards body?<br><br>who would be responsible for carrying out such a public audit - afte action review?<br>
<br>Never heard of ISACA-Kenya?<br><br>Edith<br>________________________________________<br>From: kictanet [kictanet-bounces+eadera=<a href="mailto:idrc.ca@lists.kictanet.or.ke" target="_blank">idrc.ca@lists.kictanet.or.ke</a>] on behalf of Walubengo J [<a href="mailto:jwalu@yahoo.com" target="_blank">jwalu@yahoo.com</a>]<br>
Sent: Tuesday, March 12, 2013 12:08 PM<br>To: Edith Adera<br>Cc: KICTAnet ICT Policy Discussions<br>Subject: Re: [kictanet] Our Response to Systematic ICT Systems Failure at IEBC<br><br>+1,<br>@ Sam,<br>From your pitch,<br>
>>...are we saying that nobody in this list bid for this system? nobody tried? ... doesn't that mean we are just talking ..... and talk is cheap.<br><br>am tempted to confess that indeed as a member of the ISACA-Kenya (the information system audit community) I did get an invite to make a bid to externally audit the election information system. But guess what, the invite came on a Friday Feb 22nd and was due by that Monday 25th which incidentally was then just 1week to the voting/election day. Assuming the eventual IS Auditor (whoever it was) did find issues that needed more than a week to fix?<br>
<br>My point which I have been singing all along, folks in Government and related type of organisations know what needs to be done, they just never get the complimentary and necessary support in a timely manner. So your post-mortem must go beyond the technical and begin to address the "organisational" context/issues.<br>
<br>walu.<br><br><br><br>________________________________<br>From: Sam Gichuru <<a href="mailto:gichuru@gmail.com" target="_blank">gichuru@gmail.com</a>><br>To: <a href="mailto:jwalu@yahoo.com" target="_blank">jwalu@yahoo.com</a><br>
Cc: KICTAnet ICT Policy Discussions <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>><br>Sent: Tuesday, March 12, 2013 6:45 PM<br>Subject: Re: [kictanet] Our Response to Systematic ICT Systems Failure at IEBC<br>
<br>Edith,<br><br>I am one of those who suggested a full Audit of the system but only after the elections and I am definitely looking forward to this weeks #140 Friday with Brian, I hear people involved will be available for candid discussions.<br>
<br>What I am seeing and I stand to be corrected is the spectator syndrome, when everything is ok and the international press highlight Kenya as a tech destination, Mpesa is praised, Ushahidi and startups with all our Mvitus, we celebrate, claim our team (#teamtech/ICT) is winning and write long blog posts and gazillion tweets etc<br>
<br>This only last as long as nothing goes wrong, but when it does, suddenly the conversation changes from "we" to "them", they have failed, they dint consult, they dint test, they... not us. This is what most football fans/Spectators do, they love their football team only when its winning, which basically makes one wonder are we players or are we fans of this game?<br>
<br>But to bring this home, we have a bigger problem, if this community started asking about the procurement process, the system architect and the companies that were selected to implement the IEBC system only after it failed, we are not engaging enough, are we saying that nobody in this list bid for this system? nobody tried? ... doesn't that mean we are just talking ..... and talk is cheap.<br>
<br>I would like to challenge the community to engage more with an aim to problem solve, to tender and bid for local contracts, to build more open source solutions, to fundraise with an aim to seed fund startups, if we dont... we are going to be running around in circles and then move to Rwanda and guess what we will all say ..... they dint do xyz...<br>
<br><br>Let ask Ourselves ... who is they?<br><br><br>On Tue, Mar 12, 2013 at 4:35 PM, Edith Adera <<a href="mailto:eadera@idrc.ca" target="_blank">eadera@idrc.ca</a><mailto:<a href="mailto:eadera@idrc.ca" target="_blank">eadera@idrc.ca</a>>> wrote:<br>
Harry,<br><br>Not sure you were in Kenya or buried your head in the sand!<br><br>It’s a fact that the system did not work and IEBC had to revert to the manual system as reported by the Chair of the IEBC on TV.<br><br>We need to learn to tell the truth as a country and confront our issues. Someone suggested on this list, can’t remember who, that as an ICT industry an audit should be carried out so we know what went wrong and learn for the future.<br>
<br>Why do we always turn to the easy targets….tribalism, partisan interests etc when hard questions are asked?<br><br>Edith<br><br>From: kictanet [mailto:<a href="mailto:kictanet-bounces%2Beadera" target="_blank">kictanet-bounces+eadera</a><<a href="mailto:kictanet-bounces%2Beadera" target="_blank">mailto:kictanet-bounces%2Beadera</a>>=<a href="mailto:idrc.ca@lists.kictanet.or.ke" target="_blank">idrc.ca@lists.kictanet.or.ke</a><mailto:<a href="mailto:idrc.ca@lists.kictanet.or.ke" target="_blank">idrc.ca@lists.kictanet.or.ke</a>>] On Behalf Of Harry Delano<br>
Sent: March 12, 2013 3:22 PM<br>To: Edith Adera<br>Cc: KICTAnet ICT Policy Discussions<br>Subject: [kictanet] Our Response to Systematic ICT Systems Failure at IEBC<br><br><br>Aye..!<br><br>Could someone please aver what the furor was all about on this list when systems failed at IEBC last week. I thought it was so that<br>
we could address systemic issues in that part of the election process..? Please someone correct me, but I seem to be settling on<br>this conclusion that we collectively only raise hue and cry when the system(s) are perceived to be working against “us”, or not in<br>
“our” interests – whichever side of divide each one of us sits. Once they serve ‘our’ interests, we quickly move on.. So where is<br>posterity in all this..? A pattern emerges where well calculated intellectual arguments everywhere nowadays, that thinly veil and<br>
mask the real motives in us. We completely bury our heads in the ground and deny that we have deeply rooted issues that stem<br>from tribe, class etc and as a result, we are caught up in this vicious cycle that we cannot seem to free ourselves from and which<br>
clouds our entire vision as a nation. Who will free us, if we do not take initiative ourselves..? How and when will we as a nation<br>confront this ‘monster’ head on, by first of all acknowledging it exists. Then moving to deal with it. Can this list be at the forefront<br>
of it..?<br><br>If so, let’s start now..<br><br>Harry<br><br>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><mailto:<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br><br>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/gichuru%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/gichuru%40gmail.com</a><br>
<br>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
<br><br><br>--<br>Warm Regards,<br>------------------------<br>Sam Gichuru<br><br><br>twitter: | @samgichuru<<a href="http://twitter.com/samgichuru" target="_blank">http://twitter.com/samgichuru</a>><br>Blog: | <a href="http://www.samgichuru.com" target="_blank">www.samgichuru.com</a><<a href="http://www.samgichuru.com/" target="_blank">http://www.samgichuru.com/</a>><br>
Facebook: | Sam.g<<a href="http://sam.g/" target="_blank">http://sam.g/</a>>ichuru<<a href="http://www.facebook.com/sam.gichuru" target="_blank">http://www.facebook.com/sam.gichuru</a>><br>Skype: Sam.gichuru<br>
Cellphone: | +254-722-730565<br><br>Co-founder/ Director /Nailab Incubation<br>Location: | Nairobi<br>Website: | <a href="http://www.nailab.co.ke" target="_blank">www.nailab.co.ke</a><<a href="http://www.nailab.co.ke/" target="_blank">http://www.nailab.co.ke/</a>><br>
twitter: | @thenailab<br><br>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><mailto:<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br><br>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com</a><br>
<br>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
<br><br><u></u><u></u></span></p></div></div></div></div></div></div></div><br>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/kivuva%40transworldafrica.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/kivuva%40transworldafrica.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br><br clear="all"><div><br></div>-- <br>______________________<br>Mwendwa Kivuva<br>For<br>Business Development<br>Transworld Computer Channels<br>Cel: 0722402248<br><a href="http://twitter.com/lordmwesh" target="_blank">twitter.com/lordmwesh</a><br>
<a href="http://www.transworldAfrica.com" target="_blank">www.transworldAfrica.com</a> | Fluent in computing<br><a href="http://kenya.or.ke" target="_blank">kenya.or.ke</a> | The Kenya we know<br>
</div></div></div>