<p><br>
Thanks GG for starting this discussion.</p>
<p>Ali has raised very important points.</p>
<p>The questions to ask here is, what is the cost of banning anonymous advertising in the cyberspace? Is it worth it? and How will it affect business both online and offline?</p>
<div class="gmail_quote">On Nov 25, 2013 3:46 AM, "Ali Hussein" <<a href="mailto:ali@hussein.me.ke" target="_blank">ali@hussein.me.ke</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">


<div dir="auto"><div>Grace and listers</div><div><br></div><div>1. Net Anonymity forms a cornerstone of how the Internet has evolved and grown to become the mass communication tool it is today. Although the proposals mean well in terms of trying to cap criminal activities it is a double edged sword. </div>


<div><br></div><div>a) How will whistle blowers be protected if they feel their identities will be compromised? </div><div>b) My right as a citizen to contribute in healthy sometimes sensitive political discourse in some cases require a certain level of anonymity.</div>


<div>c) How we counter needs of national security and personal freedoms without blanket condemnation of particular religious or ethnic groups will define us as a nation and continent.</div><div>d) We need to be very careful that we don't quash the very environment and ecosystem that has allowed some African countries to thrive and be thought leaders in the online space.</div>


<div><br><div><span>Ali Hussein</span></div><div><br></div><div style="font-family:Helvetica;font-size:medium">+254 0770 906375 / 0713 601113</div><div><span><br></span></div><div>"I fear the day technology will surpass human interaction. The world will have a generation of idiots".  ~ Albert Einstein</div>


<div><span><br></span></div>Sent from my iPad</div><div><br>On Nov 25, 2013, at 12:39 AM, Grace Githaiga <<a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>> wrote:<br><br></div><blockquote type="cite">


<div>


<div dir="ltr"><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial">Good morning Listers<u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><br></p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial">Further to the announcement we made last Friday, we now commence this one week discussion on the
African Union Convention on Cyber Security(AUCC)</p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><a href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf" target="_blank"><span style="color:#0068cf">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><span> </span>on multiple lists of KICTANet and
ISOC-KE, in Kenya and on<span><span style="color:#cd232c"> </span></span>I-Network list moderated by the<span> </span>Collaboration on International ICT
Policy in East and Southern Africa<span style="color:#cd232c"> </span>(CIPESA) 
and ISOC -Uganda.</p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><br></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b>Background to the African Union
Convention on Cyber Security (AUCC)</b><u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial">African Union (AU) convention (52 page document) seeks to
intensify the fight against cybercrime across Africa in light of increase in
cybercrime, and a lack of mastery of security risks by African countries.
Further, that one challenge for African countries is lack of technological
security adequate enough to prevent and effectively control technological
and informational risks. As such “African States are in dire need of innovative
criminal policy strategies that embody States, societal and technical responses
to create a credible legal climate for cyber security”.<u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial">The Convention establishes a framework for cybersecurity in
Africa “through organisation of electronic transactions, protection of personal
data, promotion of cyber security, e-governance and combating cybercrime”
(Conceptual framework).</p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><br></p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial">As an additional reference to the earlier ones, please find attached a letter that was sent to the AU by the Center for Intellectual Property and Information Technology law and Strathmore University school of law.</p>


<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><br></p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><br></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b>We begin the discussion with Part 1 on Electronic transactions. Today, we will discuss two out of four articles from this section.</b></p>


<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b> </b><u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b>Section III: Publicity by electronic means</b><u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b> Article I – 7:</b><u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><i> Without prejudice to Article I-4 any advertising
action, irrespective of its form, accessible through online communication service,
shall be clearly identified as such. It shall clearly identify the individual
or corporate body on behalf of whom it is undertaken.</i><u></u><u></u></p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><i><br></i></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b>Question:</b><span> </span>Should net
anonymity be legislated?<span> </span>If
so, what measures need to be or not be considered?<span> </span></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b><br></b></p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b>Question:</b><span> </span>Should
individuals or companies be obliged to reveal their identities and what are the
implications? <u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><b><br>
Article I – 8:</b><u></u><u></u></p>

<p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><i>The conditions governing the possibility of promotional
offers as well as the conditions  for participating in promotional
competitions or games where such offers, competitions or games are
electronically disseminated, shall be clearly spelt out and easily accessible.</i><u></u><u></u></p><p class="MsoNormal" style="line-height:16.5pt;background-repeat:initial initial"><i><br></i></p>

<b><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif">Question:</span></b><span><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif"> </span></span><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif">Should an<span> </span></span><span>international (or should we call it regional)<span><span style="color:#cd232c"> </span></span>law legislate on promotional offers and competitions
offered locally?<span> </span></span><div><span><br></span></div><div><span>Over to you Listers. Let us engage and make concrete suggestions.</span></div><div><span><br></span></div><div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px">A great week to you all.</span></font></div>


<div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px">Rgds</span></font></div><div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px">GG</span></font></div><div><span><br>



<br>
</span></div>                                         </div>
</div></blockquote><blockquote type="cite"><div><RECOMMENDATIONS ON AUCC.pdf></div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>isoc mailing list</span><br>


<span><a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a></span><br><span><a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a></span><br>


</div></blockquote></div><br>_______________________________________________<br>
isoc mailing list<br>
<a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a><br>
<a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a><br>
<br></blockquote></div>