<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style></head>
<body class='hmmessage'><div dir='ltr'>Thanks Ali and Liz for your responses and for raising further queries. We would also welcome recommendations. As of now, we will move your queries into our reporting template and will see what recommendations can be made in the final document. <div><br></div><div>Let us keep the debate live. </div><div>Rgds</div><div>Grace<br><br><div><hr id="stopSpelling">Date: Mon, 25 Nov 2013 19:19:55 +0300<br>Subject: Re: [ISOC_KE] Day 1: On-line debate on African Union Convention on Cyber Security (AUCC)<br>From: lizorembo@gmail.com<br>To: ali@hussein.me.ke<br>CC: isoc@orion.my.co.ke; ggithaiga@hotmail.com; kictanet@lists.kictanet.or.ke<br><br><br>
Thanks GG for starting this discussion.<BR>
Ali has raised very important points.<BR>
The questions to ask here is, what is the cost of banning anonymous advertising in the cyberspace? Is it worth it? and How will it affect business both online and offline?<BR>
<div class="ecxgmail_quote">On Nov 25, 2013 3:46 AM, "Ali Hussein" <<a href="mailto:ali@hussein.me.ke" target="_blank">ali@hussein.me.ke</a>> wrote:<br><blockquote class="ecxgmail_quote" style="border-left:1px #ccc solid;padding-left:1ex;">
<div dir="auto"><div>Grace and listers</div><div><br></div><div>1. Net Anonymity forms a cornerstone of how the Internet has evolved and grown to become the mass communication tool it is today. Although the proposals mean well in terms of trying to cap criminal activities it is a double edged sword. </div>
<div><br></div><div>a) How will whistle blowers be protected if they feel their identities will be compromised? </div><div>b) My right as a citizen to contribute in healthy sometimes sensitive political discourse in some cases require a certain level of anonymity.</div>
<div>c) How we counter needs of national security and personal freedoms without blanket condemnation of particular religious or ethnic groups will define us as a nation and continent.</div><div>d) We need to be very careful that we don't quash the very environment and ecosystem that has allowed some African countries to thrive and be thought leaders in the online space.</div>
<div><br><div><span>Ali Hussein</span></div><div><br></div><div style="font-family:Helvetica;font-size:medium;">+254 0770 906375 / 0713 601113</div><div><span><br></span></div><div>"I fear the day technology will surpass human interaction. The world will have a generation of idiots". ~ Albert Einstein</div>
<div><span><br></span></div>Sent from my iPad</div><div><br>On Nov 25, 2013, at 12:39 AM, Grace Githaiga <<a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>> wrote:<br><br></div><blockquote>
<div>
<div dir="ltr"><p class="ecxMsoNormal" style="line-height:16.5pt;">Good morning Listers<u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><br></p><p class="ecxMsoNormal" style="line-height:16.5pt;">Further to the announcement we made last Friday, we now commence this one week discussion on the
African Union Convention on Cyber Security(AUCC)</p><p class="ecxMsoNormal" style="line-height:16.5pt;"><a href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf" target="_blank"><span style="color:#0068cf;">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><span> </span>on multiple lists of KICTANet and
ISOC-KE, in Kenya and on<span><span style="color:#cd232c;"> </span></span>I-Network list moderated by the<span> </span>Collaboration on International ICT
Policy in East and Southern Africa<span style="color:#cd232c;"> </span>(CIPESA)
and ISOC -Uganda.</p><p class="ecxMsoNormal" style="line-height:16.5pt;"><br></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b>Background to the African Union
Convention on Cyber Security (AUCC)</b><u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;">African Union (AU) convention (52 page document) seeks to
intensify the fight against cybercrime across Africa in light of increase in
cybercrime, and a lack of mastery of security risks by African countries.
Further, that one challenge for African countries is lack of technological
security adequate enough to prevent and effectively control technological
and informational risks. As such �African States are in dire need of innovative
criminal policy strategies that embody States, societal and technical responses
to create a credible legal climate for cyber security�.<u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;">The Convention establishes a framework for cybersecurity in
Africa �through organisation of electronic transactions, protection of personal
data, promotion of cyber security, e-governance and combating cybercrime�
(Conceptual framework).</p><p class="ecxMsoNormal" style="line-height:16.5pt;"><br></p><p class="ecxMsoNormal" style="line-height:16.5pt;">As an additional reference to the earlier ones, please find attached a letter that was sent to the AU by the Center for Intellectual Property and Information Technology law and Strathmore University school of law.</p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><br></p><p class="ecxMsoNormal" style="line-height:16.5pt;"><br></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b>We begin the discussion with Part 1 on Electronic transactions. Today, we will discuss two out of four articles from this section.</b></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b> </b><u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b>Section III: Publicity by electronic means</b><u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b> Article I � 7:</b><u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><i> Without prejudice to Article I-4 any advertising
action, irrespective of its form, accessible through online communication service,
shall be clearly identified as such. It shall clearly identify the individual
or corporate body on behalf of whom it is undertaken.</i><u></u><u></u></p><p class="ecxMsoNormal" style="line-height:16.5pt;"><i><br></i></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b>Question:</b><span> </span>Should net
anonymity be legislated?<span> </span>If
so, what measures need to be or not be considered?<span> </span></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b><br></b></p><p class="ecxMsoNormal" style="line-height:16.5pt;"><b>Question:</b><span> </span>Should
individuals or companies be obliged to reveal their identities and what are the
implications? <u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><b><br>
Article I � 8:</b><u></u><u></u></p>
<p class="ecxMsoNormal" style="line-height:16.5pt;"><i>The conditions governing the possibility of promotional
offers as well as the conditions for participating in promotional
competitions or games where such offers, competitions or games are
electronically disseminated, shall be clearly spelt out and easily accessible.</i><u></u><u></u></p><p class="ecxMsoNormal" style="line-height:16.5pt;"><i><br></i></p>
<b><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif;">Question:</span></b><span><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif;"> </span></span><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif;">Should an<span> </span></span><span>international (or should we call it regional)<span><span style="color:#cd232c;"> </span></span>law legislate on promotional offers and competitions
offered locally?<span> </span></span><div><span><br></span></div><div><span>Over to you Listers. Let us engage and make concrete suggestions.</span></div><div><span><br></span></div><div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px;">A great week to you all.</span></font></div>
<div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px;">Rgds</span></font></div><div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px;">GG</span></font></div><div><span><br>
<br>
</span></div> </div>
</div></blockquote><blockquote><div><RECOMMENDATIONS ON AUCC.pdf></div></blockquote><blockquote><div><span>_______________________________________________</span><br><span>isoc mailing list</span><br>
<span><a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a></span><br><span><a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a></span><br>
</div></blockquote></div><br>_______________________________________________<br>
isoc mailing list<br>
<a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a><br>
<a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a><br>
<br></blockquote></div></div></div> </div></body>
</html>