<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">Great going GG<br>
<br>
Appreciate it. <br>
<br>
Best <br>
Alice<br>
<br>
<br>
<br>
On 22/11/2013 08:42, Grace Githaiga wrote:<br>
</div>
<blockquote cite="mid:DUB111-W7688A88C1FE1CDE76FFD02B4E00@phx.gbl"
type="cite">
<div dir="ltr">
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style>
<div dir="ltr">
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Good morning Listers<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">We would like to propose an online
discussion on the
African Union Convention on Cyber Security(AUCC)<a
moz-do-not-send="true"
href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf"
target="_blank" shape="rect" style="cursor: pointer;"><span
style="color:#0068CF">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><span
class="apple-converted-space"> </span>on multiple lists of
KICTANet and
ISOC-KE, in Kenya and on<span class="apple-converted-space"><span
style="color:#CD232C"> </span></span>I-Network list
moderated by the<span class="apple-converted-space"> </span>Collaboration
on International ICT
Policy in East and Southern Africa<span
style="color:#CD232C"> </span>(CIPESA)
and ISOC -Uganda,<span style="color:#CD232C"> </span><span
class="apple-converted-space"> </span>starting from Monday
25<sup>th</sup><span class="apple-converted-space"> </span>to
Friday 29<sup>th</sup><span class="apple-converted-space"> </span>November
2013. We will also share the concerns
with the best bits list <a moz-do-not-send="true"
href="http://bestbits.net/">http://bestbits.net/</a>, the
Internet Governance Caucus list <a moz-do-not-send="true"
href="http://igcaucus.org/">http://igcaucus.org/</a> and
Access Now <a moz-do-not-send="true"
href="https://www.accessnow.org/" target="_blank"
style="font-size: 12pt;">https://www.accessnow.org/</a> since
we would like to give as much input as possible<span
style="line-height: 16.5pt; font-size: 12pt;">.</span></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><br>
</p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">We have been in discussion with AUC and
the drafters have
accepted to receive our input despite having gone through
this process two
years ago with African governments. In light of this window
of opportunity, we
suggest we engage. AUC will discuss the convention during
the AU ICT week scheduled for December 1-6, 2013<o:p></o:p><a
moz-do-not-send="true"
href="http://www.africanictweek.org/" target="_blank"
style="font-size: 12pt;">http://www.africanictweek.org/</a></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><br>
</p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">For Kenya, it is important that we engage,
the reason being
that if Kenya signs into this convention in January 2014, it
will become
binding as stipulated in Kenya’s 2010 Constitution Article 2
(6) which
states:<span class="apple-converted-space"> </span><i>Any
treaty or
convention ratified by Kenya shall form part of the law of
Kenya under this
Constitution.<span class="apple-converted-space"> </span></i>The
Convention
is therefore<span class="apple-converted-space"><span
style="color:#444444"> </span></span><span
style="color:#444444">more like a Bill of Parliament.</span><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><o:p> </o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>1.</b> <span
class="apple-converted-space"> </span><b>Background to the
African Union Convention
on Cyber Security (AUCC)</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">African Union (AU) convention (52 page
document) seeks to
intensify the fight against cybercrime across Africa in
light of increase in
cybercrime, and a lack of mastery of security risks by
African countries.
Further, that one challenge for African countries is lack of
technological
security adequate enough to prevent and effectively control
technological
and informational risks. As such “African States are in dire
need of innovative
criminal policy strategies that embody States, societal and
technical responses
to create a credible legal climate for cyber security”.<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">The Convention establishes a framework for
cybersecurity in
Africa “through organisation of electronic transactions,
protection of personal
data, promotion of cyber security, e-governance and
combating cybercrime”
(Conceptual framework).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> <o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>2.</b> <span
class="apple-converted-space"> </span><b>Division of the
Convention</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Part 1
Electronic transactions</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section I:
Definition
of terms<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section II:
Electronic
Commerce (Fields of application of electronic commerce,
Contractual
responsibility of the electronic provider of goods and
services).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section III:
Publicity by electronic
means.<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section IV:
Obligations in electronic form
(Electronic contracts, Written matter in electronic form,
Ensuring the security
of electronic transactions).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> <o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Part II PERSONAL DATA PROTECTION</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section I:
Definition<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section II:
Legal framework
for personal data protection (Objectives of this Convention
with respect to
personal data, Scope of application of the Convention,
Preliminary formalities
for personal data processing).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section III:
Institutional framework
for protection of personal data (Status, composition or
organization, Functions
of the protection authority).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section IV:
Obligations relating to the
conditions governing the processing of personal data (basic
principles
governing the processing of personal data, Specific
principles governing the
processing of sensitive data, Interconnection<span
class="apple-converted-space"> </span>of
personal data files).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section V:
The rights of the
person whose personal data are to be processed (Right to
information, Right of access,
Right of opposition, Right of correction or suppression).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section VI:
Obligations of the personal
data processing official (Confidentiality obligations,
Security obligations,
Conservation obligations, Sustainability obligations).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> </b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>PART III – PROMOTING CYBERSECURITY AND
COMBATING CYBERCRIME</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section 1:
Terminology,
National cyber security framework, Legislative measures,
National cyber
security system, National cyber security monitoring
structures).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section II:
Material penal law
(Offenses specific to Information and Communication
Technologies [Attack on,
computerized data, Content related offenses], Adapting
certain information and
communication technologies offenses).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section II:
Criminal liability
for corporate persons (Adapting certain sanctions to the
Information and
Communication Technologies, Other penal sanctions,<span
class="apple-converted-space"> </span>Procedural law,
Offenses specific to
Information and Communication Technologies).<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> </b></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> PART IV: COMMON AND FINAL PROVISIONS</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> Section I:
Monitoring
mechanism<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Section II:
Final responses<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> </b></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>The Proposed Discussion</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">We have picked on articles that need
clarity, and would
request listers to kindly discuss them and provide
recommendations where
necessary.<span class="apple-converted-space"> </span>Also,
where
necessary, listers are encouraged to identify and share
other articles that
need clarifications that we may have left out.</p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> <o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Day 1 Monday 25/ 11/2013</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>We begin with Part 1 on Electronic
transactions and pick on
four articles which we will discuss on Monday (25/11) and
Tuesday (26/11). </b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Section III: Publicity by electronic
means</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> Article I – 7:</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i> Without prejudice to Article I-4 any
advertising
action, irrespective of its form, accessible through
online communication
service, shall be clearly identified as such. It shall
clearly identify the
individual or corporate body on behalf of whom it is
undertaken.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>Should net
anonymity be legislated?<span class="apple-converted-space"> </span>If
so,
what measures need to be or not be considered?<span
class="apple-converted-space"> </span></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>Should
individuals or companies be obliged to reveal their
identities and what are the
implications? <o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><br>
Article I – 8:</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>The conditions governing the
possibility of promotional
offers as well as the conditions for participating in
promotional
competitions or games where such offers, competitions or
games are
electronically disseminated, shall be clearly spelt out
and easily accessible.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>Should an<span
class="apple-converted-space"> </span>international (or
should we
call it regional)<span class="apple-converted-space"><span
style="color:#CD232C"> </span></span>law legislate on
promotional offers and competitions
offered locally?<span class="apple-converted-space"> </span><br>
<br>
<b><u>Day 2 Tuesday 26/11/13</u></b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Article I – 9:<br>
</b><i>Direct marketing through any form of
indirect communication including messages forwarded with
automatic message
sender, facsimile or electronic mails in whatsoever form,
using the particulars
of an individual who has not given prior consent to
receiving the said direct
marketing through the means indicated, shall be prohibited
by the member states
of the African Union.<o:p></o:p></i></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><br>
</b></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Article I – 10:</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i> The provisions of Article I – 9 above
notwithstanding, direct marketing prospection by
electronic mails shall be
permissible where:</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>1) The particulars of the addressee
have been obtained
directly from him/her,</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>2) The recipient has given consent to
be contacted by the
prospector partners</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>3) The direct prospection concerns
similar products or
services provided by the same individual or corporate
body.</i><o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom: 12pt; line-height:
16.5pt; background-position: initial initial;
background-repeat: initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>Is this a realistic
way of dealing with spam? <o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom: 0.0001pt;
line-height: 16.5pt; background-position: initial initial;
background-repeat: initial initial;"><b><br>
</b></p>
<p class="MsoNormal" style="margin-bottom: 0.0001pt;
line-height: 16.5pt; background-position: initial initial;
background-repeat: initial initial;"><b>Article I – 27</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>Where the legislative provisions of
Member States have not
laid down other provisions, and where there is no valid
agreement between the
parties, the judge shall resolve proof related conflicts
by determining by all
possible means the most plausible claim regardless of the
message base
employed.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>What is the
meaning of this article and is it necessary?<span
class="apple-converted-space"> </span>Some
clarity needed!</p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><o:p> </o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><u>Day 3 Wednesday 27 /11/13</u></b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><u>Today, we move onto PART II:
PERSONAL DATA PROTECTION and
will deal with three questions.</u></b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Objectives of this Convention with
respect to personal data</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> <b>Article II – 2:</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>Each Member State of the African Union
shall put in place a
legal framework with a view to establishing a mechanism to
combat breaches of
private life likely to arise from the gathering,
processing, transmission,
storage and use of personal data.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>The mechanism so established shall
ensure that any data
processing, in whatsoever form, respects the freedoms and
fundamental rights of
physical persons while recognizing the prerogatives of the
State, the rights of
local communities and the target for which the businesses
were established.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>What is the
relevance of this article?<span
class="apple-converted-space"> </span>What
are these state prerogatives? And given the increased
interest of state surveillance,
how can states balance respect of FOE while recognising
state prerogatives?<span class="apple-converted-space"> </span></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Article II-6, II-7, 11-8, II-11, II-12,
II-13 refer to a
Protection Authority</b><span
class="apple-converted-space"> </span>which is
meant to establish standards for data protection. Article II
– 14<span class="apple-converted-space"><i> </i></span><i>provides
for each Member
State of the African Union to establish an authority with
responsibility to
protect personal data. It</i><span
class="apple-converted-space"> </span><i>shall
be an independent administrative authority with the task
of ensuring that the
processing of personal data is conducted in accordance
with domestic
legislations.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">In article II-17 states that<span
class="apple-converted-space"> ‘</span><i>Sworn agents may
be invited to
participate in audit missions in accordance with extant
provisions in Member
States of the African Union’.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>Considering
that this article seems to be tied to the Protection
Authority, what is its
relevance? And who is a ‘sworn agent?’<span
class="apple-converted-space"> </span>What
should this authority look like in terms of its composition?<span
class="apple-converted-space"> </span></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><br>
</b></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Article II – 20:</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>…Members of the protection authority
shall not receive
instructions from any authority in the exercise of their
functions. </i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><br>
</b></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Article II – 21:</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>Member States are engaged to provide
the national
protection authority human, technical and financial
resources necessary to
accomplish their mission.</i><o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom: 12pt; line-height:
16.5pt; background-position: initial initial;
background-repeat: initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>It appears that this
Data Protection Authority is envisaged
to be fully government supported. Therefore, should we be
talking of its
independence? In what way should this article be framed so
that it ensures
independence of the Authority?<o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom: 0.0001pt;
line-height: 16.5pt; background-position: initial initial;
background-repeat: initial initial;"><b><br>
</b></p>
<p class="MsoNormal" style="margin-bottom: 0.0001pt;
line-height: 16.5pt; background-position: initial initial;
background-repeat: initial initial;"><b>Article II – 28 to
II-34<span class="apple-converted-space"> </span></b>outlines
six
principles governing the processing of personal data namely:<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Consent and of legitimacy,<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Honesty,<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Objective, relevance and conservation of
processed personal
data,<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> Accuracy,<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Transparency and<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> Confidentiality and security of personal
data.<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">Under each of the specific principles,
detailed explanation
of how each should be undertaken is offered.<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:</b><span
class="apple-converted-space"> </span>Is this
explanation and detailing of how to undertake each necessary
in an<span class="apple-converted-space"> </span>international
(regional) law
necessary or needed?<span class="apple-converted-space"> </span>Is
this
legislation overkill?</p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b><br>
</b></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Day 4 Thursdsay 28/11/2013
Part III</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Day 4 will focus on PROMOTING
CYBERSECURITY AND COMBATING
CYBERCRIME</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><br>
</p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> <b>Article III – 14: Harmonization</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>1) Member States have to undertake
necessary measures to
ensure that the legislative measures and / or regulations
adopted to fight
against cybercrime enhance the possibility of regional
harmonization of these
measures and respect the principle of double criminality.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question</b>: What is the
principle of double criminality here?<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> </b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Section II: Other penal sanctions</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"> <b>Article III – 48</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><i>Each Member State of the African Union
have to take
necessary legislative measures to ensure that, in the case
of conviction for an
offense committed by means of digital communication
facility, the competent
jurisdiction or the judge handling the case gives a ruling
imposing additional
punishment.</i><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Question:<span
class="apple-converted-space"> </span></b> What is the
interpretation of additional punishment?
Is this not granting of absolute powers to judges?<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> </b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>Day Five 29/11/2013</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">This will be dedicated to any other
issue(s)that listers
may want to raise in regard to the Convention. Further,
listers can go back to
issues of any other day and discuss them here.<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">What other issue(s) would you like to
raise?<o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b> </b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><b>References</b><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;">DRAFT AFRICAN UNION CONVENTION ON THE
CONFIDENCE AND
SECURITY IN CYBERSPACE<a moz-do-not-send="true"
href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf"
target="_blank" shape="rect" style="cursor: pointer;"><span
style="color:#0068CF">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><a moz-do-not-send="true"
href="http://daucc.wordpress.com/" target="_blank"
shape="rect" style="cursor: pointer;"><span
style="color:#0068CF">http://daucc.wordpress.com/</span></a><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><a moz-do-not-send="true"
href="http://www.thepetitionsite.com/takeaction/262/148/817/"
target="_blank" shape="rect" style="cursor: pointer;"><span
style="color:#0068CF">http://www.thepetitionsite.com/takeaction/262/148/817/</span></a><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><a moz-do-not-send="true"
href="http://daucc.wordpress.com/2013/10/29/paper-review-basic-drawbacks-of-the-draft-african-union-convention-on-the-confidence-and-security-in-cyberspace/"
target="_blank" shape="rect" style="cursor: pointer;"><span
style="color:#0068CF">http://daucc.wordpress.com/2013/10/29/paper-review-basic-drawbacks-of-the-draft-african-union-convention-on-the-confidence-and-security-in-cyberspace/</span></a><o:p></o:p></p>
<p class="MsoNormal" style="line-height: 16.5pt;
background-position: initial initial; background-repeat:
initial initial;"><a moz-do-not-send="true"
href="http://michaelmurungi.blogspot.com/2012/08/comments-on-draft-african-union.html"
target="_blank" shape="rect" style="cursor: pointer;"><span
style="color:#0068CF">http://michaelmurungi.blogspot.com/2012/08/comments-on-draft-african-union.html</span></a><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Have a great weekend and see you on
Monday.</p>
<p class="MsoNormal"><br>
</p>
<p class="MsoNormal">Rgds</p>
<p class="MsoNormal">Grace</p>
</div>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
kictanet mailing list
<a class="moz-txt-link-abbreviated" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>
<a class="moz-txt-link-freetext" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a>
Unsubscribe or change your options at <a class="moz-txt-link-freetext" href="https://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org">https://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org</a>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</pre>
</blockquote>
<br>
</body>
</html>