<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">Great going GG<br>
      <br>
      Appreciate it. <br>
      <br>
      Best <br>
      Alice<br>
      <br>
      <br>
      <br>
      On 22/11/2013 08:42, Grace Githaiga wrote:<br>
    </div>
    <blockquote cite="mid:DUB111-W7688A88C1FE1CDE76FFD02B4E00@phx.gbl"
      type="cite">
      <div dir="ltr">
        <style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style>
        <div dir="ltr">
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Good morning Listers<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">We would like to propose an online
            discussion on the
            African Union Convention on Cyber Security(AUCC)<a
              moz-do-not-send="true"
href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf"
              target="_blank" shape="rect" style="cursor: pointer;"><span
                style="color:#0068CF">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><span
              class="apple-converted-space"> </span>on multiple lists of
            KICTANet and
            ISOC-KE, in Kenya and on<span class="apple-converted-space"><span
                style="color:#CD232C"> </span></span>I-Network list
            moderated by the<span class="apple-converted-space"> </span>Collaboration
            on International ICT
            Policy in East and Southern Africa<span
              style="color:#CD232C"> </span>(CIPESA) 
            and ISOC -Uganda,<span style="color:#CD232C"> </span><span
              class="apple-converted-space"> </span>starting from Monday
            25<sup>th</sup><span class="apple-converted-space"> </span>to
            Friday 29<sup>th</sup><span class="apple-converted-space"> </span>November
            2013. We will also share the concerns
            with the best bits list <a moz-do-not-send="true"
              href="http://bestbits.net/">http://bestbits.net/</a>, the
            Internet Governance Caucus list <a moz-do-not-send="true"
              href="http://igcaucus.org/">http://igcaucus.org/</a> and
            Access Now <a moz-do-not-send="true"
              href="https://www.accessnow.org/" target="_blank"
              style="font-size: 12pt;">https://www.accessnow.org/</a> since
            we would like to give as much input as possible<span
              style="line-height: 16.5pt; font-size: 12pt;">.</span></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><br>
          </p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">We have been in discussion with AUC and
            the drafters have
            accepted to receive our input despite having gone through
            this process two
            years ago with African governments. In light of this window
            of opportunity, we
            suggest we engage. AUC will discuss the convention during
            the AU ICT week scheduled for December 1-6, 2013<o:p></o:p><a
              moz-do-not-send="true"
              href="http://www.africanictweek.org/" target="_blank"
              style="font-size: 12pt;">http://www.africanictweek.org/</a></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><br>
          </p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">For Kenya, it is important that we engage,
            the reason being
            that if Kenya signs into this convention in January 2014, it
            will become
            binding as stipulated in Kenya’s 2010 Constitution Article 2
            (6)  which
            states:<span class="apple-converted-space"> </span><i>Any
              treaty or
              convention ratified by Kenya shall form part of the law of
              Kenya under this
              Constitution.<span class="apple-converted-space"> </span></i>The
            Convention
            is therefore<span class="apple-converted-space"><span
                style="color:#444444"> </span></span><span
              style="color:#444444">more like a Bill of Parliament.</span><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><o:p> </o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>1.</b>      <span
              class="apple-converted-space"> </span><b>Background to the
              African Union Convention
              on Cyber Security (AUCC)</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">African Union (AU) convention (52 page
            document) seeks to
            intensify the fight against cybercrime across Africa in
            light of increase in
            cybercrime, and a lack of mastery of security risks by
            African countries.
            Further, that one challenge for African countries is lack of
            technological
            security adequate enough to prevent and effectively control
            technological
            and informational risks. As such “African States are in dire
            need of innovative
            criminal policy strategies that embody States, societal and
            technical responses
            to create a credible legal climate for cyber security”.<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">The Convention establishes a framework for
            cybersecurity in
            Africa “through organisation of electronic transactions,
            protection of personal
            data, promotion of cyber security, e-governance and
            combating cybercrime”
            (Conceptual framework).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> <o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>2.</b>      <span
              class="apple-converted-space"> </span><b>Division of the
              Convention</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Part 1   
                             
              Electronic transactions</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section I:
                        Definition
            of terms<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section II:
                       Electronic
            Commerce (Fields of application of electronic commerce,
            Contractual
            responsibility of the electronic provider of goods and
            services).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section III:
                      Publicity by electronic
            means.<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section IV:
                     Obligations in electronic form
            (Electronic contracts, Written matter in electronic form,
            Ensuring the security
            of electronic transactions).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> <o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Part II    PERSONAL DATA PROTECTION</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section I:
                        Definition<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section II:
                       Legal framework
            for personal data protection (Objectives of this Convention
            with respect to
            personal data, Scope of application of the Convention,
            Preliminary formalities
            for personal data processing).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section III:
                      Institutional framework
            for protection of personal data (Status, composition or
            organization, Functions
            of the protection authority).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section IV:
                     Obligations relating to the
            conditions governing the processing of personal data (basic
            principles
            governing the processing of personal data, Specific
            principles governing the
            processing of sensitive data, Interconnection<span
              class="apple-converted-space"> </span>of
            personal data files).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section V:
                       The rights of the
            person whose personal data are to be processed (Right to
            information, Right of access,
            Right of opposition, Right of correction or suppression).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section VI:
                     Obligations of the personal
            data processing official (Confidentiality obligations,
            Security obligations,
            Conservation obligations, Sustainability obligations).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> </b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>PART III – PROMOTING CYBERSECURITY AND
              COMBATING CYBERCRIME</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section 1:
                       Terminology,
            National cyber security framework, Legislative measures,
            National cyber
            security system, National cyber security monitoring
            structures).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section II:
                       Material penal law
            (Offenses specific to Information and Communication
            Technologies [Attack on,
            computerized data, Content related offenses], Adapting
            certain information and
            communication technologies offenses).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section II:
                       Criminal liability
            for corporate persons (Adapting certain sanctions to the
            Information and
            Communication Technologies, Other penal sanctions,<span
              class="apple-converted-space"> </span>Procedural law,
            Offenses specific to
            Information and Communication Technologies).<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> </b></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> PART IV: COMMON AND FINAL PROVISIONS</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> Section I:
                       Monitoring
            mechanism<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Section II:
                       Final responses<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> </b></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>The Proposed Discussion</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">We have picked on articles that need
            clarity, and would
            request listers to kindly discuss them and provide
            recommendations where
            necessary.<span class="apple-converted-space"> </span>Also,
            where
            necessary, listers are encouraged to identify and share
            other articles that
            need clarifications that we may have left out.</p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> <o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Day 1 Monday 25/ 11/2013</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>We begin with Part 1 on Electronic
              transactions and pick on
              four articles which we will discuss on Monday (25/11) and
              Tuesday (26/11). </b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Section III: Publicity by electronic
              means</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> Article I – 7:</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i> Without prejudice to Article I-4 any
              advertising
              action, irrespective of its form, accessible through
              online communication
              service, shall be clearly identified as such. It shall
              clearly identify the
              individual or corporate body on behalf of whom it is
              undertaken.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>Should net
            anonymity be legislated?<span class="apple-converted-space"> </span>If
so,
            what measures need to be or not be considered?<span
              class="apple-converted-space"> </span></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>Should
            individuals or companies be obliged to reveal their
            identities and what are the
            implications? <o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><br>
              Article I – 8:</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>The conditions governing the
              possibility of promotional
              offers as well as the conditions  for participating in
              promotional
              competitions or games where such offers, competitions or
              games are
              electronically disseminated, shall be clearly spelt out
              and easily accessible.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>Should an<span
              class="apple-converted-space"> </span>international (or
            should we
            call it regional)<span class="apple-converted-space"><span
                style="color:#CD232C"> </span></span>law legislate on
            promotional offers and competitions
            offered locally?<span class="apple-converted-space"> </span><br>
            <br>
            <b><u>Day 2 Tuesday 26/11/13</u></b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Article I – 9:<br>
            </b><i>Direct marketing through any form of
              indirect communication including messages forwarded with
              automatic message
              sender, facsimile or electronic mails in whatsoever form,
              using the particulars
              of an individual who has not given prior consent to
              receiving the said direct
              marketing through the means indicated, shall be prohibited
              by the member states
              of the African Union.<o:p></o:p></i></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><br>
            </b></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Article I – 10:</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i> The provisions of Article I – 9 above
              notwithstanding, direct marketing prospection by
              electronic mails shall be
              permissible where:</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>1) The particulars of the addressee
              have been obtained
              directly from him/her,</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>2) The recipient has given consent to
              be contacted by the
              prospector partners</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>3) The direct prospection concerns
              similar products or
              services provided by the same individual or corporate
              body.</i><o:p></o:p></p>
          <p class="MsoNormal" style="margin-bottom: 12pt; line-height:
            16.5pt; background-position: initial initial;
            background-repeat: initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>Is this a realistic
            way of dealing with spam? <o:p></o:p></p>
          <p class="MsoNormal" style="margin-bottom: 0.0001pt;
            line-height: 16.5pt; background-position: initial initial;
            background-repeat: initial initial;"><b><br>
            </b></p>
          <p class="MsoNormal" style="margin-bottom: 0.0001pt;
            line-height: 16.5pt; background-position: initial initial;
            background-repeat: initial initial;"><b>Article I – 27</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>Where the legislative provisions of
              Member States have not
              laid down other provisions, and where there is no valid
              agreement between the
              parties, the judge shall resolve proof related conflicts
              by determining by all
              possible means the most plausible claim regardless of the
              message base
              employed.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>What is the
            meaning of this article and is it necessary?<span
              class="apple-converted-space"> </span>Some
            clarity needed!</p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><o:p> </o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><u>Day 3 Wednesday  27 /11/13</u></b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><u>Today, we move onto PART II:
                PERSONAL DATA PROTECTION and
                will deal with three questions.</u></b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Objectives of this Convention with
              respect to personal data</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> <b>Article II – 2:</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>Each Member State of the African Union
              shall put in place a
              legal framework with a view to establishing a mechanism to
              combat breaches of
              private life likely to arise from the gathering,
              processing, transmission,
              storage and use of personal data.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>The mechanism so established shall
              ensure that any data
              processing, in whatsoever form, respects the freedoms and
              fundamental rights of
              physical persons while recognizing the prerogatives of the
              State, the rights of
              local communities and the target for which the businesses
              were established.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>What is the
            relevance of this article?<span
              class="apple-converted-space"> </span>What
            are these state prerogatives? And given the increased
            interest of state surveillance,
            how can states balance respect of FOE while recognising
            state prerogatives?<span class="apple-converted-space"> </span></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Article II-6, II-7, 11-8, II-11, II-12,
              II-13 refer to a
              Protection Authority</b><span
              class="apple-converted-space"> </span>which is
            meant to establish standards for data protection. Article II
            – 14<span class="apple-converted-space"><i> </i></span><i>provides
              for each Member
              State of the African Union to establish an authority with
              responsibility to
              protect personal data.  It</i><span
              class="apple-converted-space"> </span><i>shall
              be an independent administrative authority with the task
              of ensuring that the
              processing of personal data is conducted in accordance
              with domestic
              legislations.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">In article II-17 states that<span
              class="apple-converted-space"> ‘</span><i>Sworn agents may
              be invited to
              participate in audit missions in accordance with extant
              provisions in Member
              States of the African Union’.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>Considering
            that this article seems to be tied to the Protection
            Authority, what is its
            relevance? And who is a ‘sworn agent?’<span
              class="apple-converted-space"> </span>What
            should this authority look like in terms of its composition?<span
              class="apple-converted-space"> </span></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><br>
            </b></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Article II – 20:</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>…Members of the protection authority
              shall not receive
              instructions from any authority in the exercise of their
              functions. </i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><br>
            </b></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Article II – 21:</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>Member States are engaged to provide
              the national
              protection authority human, technical and financial
              resources necessary to
              accomplish their mission.</i><o:p></o:p></p>
          <p class="MsoNormal" style="margin-bottom: 12pt; line-height:
            16.5pt; background-position: initial initial;
            background-repeat: initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>It appears that this
            Data Protection Authority is envisaged
            to be fully government supported. Therefore, should we be
            talking of its
            independence? In what way should this article be framed so
            that it ensures
            independence of the Authority?<o:p></o:p></p>
          <p class="MsoNormal" style="margin-bottom: 0.0001pt;
            line-height: 16.5pt; background-position: initial initial;
            background-repeat: initial initial;"><b><br>
            </b></p>
          <p class="MsoNormal" style="margin-bottom: 0.0001pt;
            line-height: 16.5pt; background-position: initial initial;
            background-repeat: initial initial;"><b>Article II – 28 to
              II-34<span class="apple-converted-space"> </span></b>outlines
six
            principles governing the processing of personal data namely:<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Consent and of legitimacy,<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Honesty,<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Objective, relevance and conservation of
            processed personal
            data,<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> Accuracy,<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Transparency and<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> Confidentiality and security of personal
            data.<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">Under each of the specific principles,
            detailed explanation
            of how each should be undertaken is offered.<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:</b><span
              class="apple-converted-space"> </span>Is this
            explanation and detailing of how to undertake each necessary
            in an<span class="apple-converted-space"> </span>international
            (regional) law
            necessary or needed?<span class="apple-converted-space"> </span>Is
            this
            legislation overkill?</p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b><br>
            </b></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Day 4 Thursdsay  28/11/2013
              Part III</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Day 4 will focus on PROMOTING
              CYBERSECURITY AND COMBATING
              CYBERCRIME</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><br>
          </p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> <b>Article III – 14: Harmonization</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>1) Member States have to undertake
              necessary measures to
              ensure that the legislative measures and / or regulations
              adopted to fight
              against cybercrime enhance the possibility of regional
              harmonization of these
              measures and respect the principle of double criminality.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question</b>: What is the
            principle of double criminality here?<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> </b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Section II: Other penal sanctions</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"> <b>Article III – 48</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><i>Each Member State of the African Union
              have to take
              necessary legislative measures to ensure that, in the case
              of conviction for an
              offense committed by means of digital communication
              facility, the competent
              jurisdiction or the judge handling the case gives a ruling
              imposing additional
              punishment.</i><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Question:<span
                class="apple-converted-space"> </span></b> What is the
            interpretation of additional punishment?
            Is this not granting of absolute powers to judges?<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> </b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>Day Five 29/11/2013</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">This will be dedicated to any other
            issue(s)that listers
            may want to raise in regard to the Convention. Further,
            listers can go back to
            issues of any other day and discuss them here.<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">What other issue(s) would you like to
            raise?<o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b> </b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><b>References</b><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;">DRAFT AFRICAN UNION CONVENTION ON THE
            CONFIDENCE AND
            SECURITY IN CYBERSPACE<a moz-do-not-send="true"
href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf"
              target="_blank" shape="rect" style="cursor: pointer;"><span
                style="color:#0068CF">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><a moz-do-not-send="true"
              href="http://daucc.wordpress.com/" target="_blank"
              shape="rect" style="cursor: pointer;"><span
                style="color:#0068CF">http://daucc.wordpress.com/</span></a><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><a moz-do-not-send="true"
              href="http://www.thepetitionsite.com/takeaction/262/148/817/"
              target="_blank" shape="rect" style="cursor: pointer;"><span
                style="color:#0068CF">http://www.thepetitionsite.com/takeaction/262/148/817/</span></a><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><a moz-do-not-send="true"
href="http://daucc.wordpress.com/2013/10/29/paper-review-basic-drawbacks-of-the-draft-african-union-convention-on-the-confidence-and-security-in-cyberspace/"
              target="_blank" shape="rect" style="cursor: pointer;"><span
                style="color:#0068CF">http://daucc.wordpress.com/2013/10/29/paper-review-basic-drawbacks-of-the-draft-african-union-convention-on-the-confidence-and-security-in-cyberspace/</span></a><o:p></o:p></p>
          <p class="MsoNormal" style="line-height: 16.5pt;
            background-position: initial initial; background-repeat:
            initial initial;"><a moz-do-not-send="true"
href="http://michaelmurungi.blogspot.com/2012/08/comments-on-draft-african-union.html"
              target="_blank" shape="rect" style="cursor: pointer;"><span
                style="color:#0068CF">http://michaelmurungi.blogspot.com/2012/08/comments-on-draft-african-union.html</span></a><o:p></o:p></p>
          <p class="MsoNormal"><o:p> </o:p></p>
          <p class="MsoNormal">Have a great weekend and see you on
            Monday.</p>
          <p class="MsoNormal"><br>
          </p>
          <p class="MsoNormal">Rgds</p>
          <p class="MsoNormal">Grace</p>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
kictanet mailing list
<a class="moz-txt-link-abbreviated" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>
<a class="moz-txt-link-freetext" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a>

Unsubscribe or change your options at <a class="moz-txt-link-freetext" href="https://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org">https://lists.kictanet.or.ke/mailman/options/kictanet/alice%40apc.org</a>

The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.

KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</pre>
    </blockquote>
    <br>
  </body>
</html>