<div dir="ltr">I support article <b style="color:rgb(0,0,0);font-family:arial,sans-serif;font-size:13px;line-height:22px">Article I – 7: </b><font color="#000000" face="arial, sans-serif"><span style="line-height:22px">as it is. Even if we are to protect the anonymity of advertisers, there should be a mechanism to track and identify them when a breach has occurred. What if a company advertises defamatory remarks about me or my company, I should be able through some mechanism to unveil the source of the defamation, otherwise the intermediary will have to bear the liability. Take an example of Google Ads, they are clearly identified as such, and if the add is not appropriate, there must be a way to identify the advertiser.<br>
</span></font><div><font color="#000000" face="arial, sans-serif"><span style="line-height:22px">Probably, the act can read something like this</span></font></div><div><br></div><div><i style="color:rgb(0,0,0);font-family:arial,sans-serif;font-size:13px;line-height:22px">"Without prejudice to Article I-4 any advertising action, irrespective of its form, accessible through online communication service, shall be clearly identified as such. </i><s>It shall</s><i style="color:rgb(0,0,0);font-family:arial,sans-serif;font-size:13px;line-height:22px"> [There shall be a mechanism (database) to]clearly identify the individual or corporate body on behalf of whom it is undertaken."</i><font color="#000000" face="arial, sans-serif"><span style="line-height:22px"><br>
</span></font></div><div><br></div></div><div class="gmail_extra"><br clear="all"><div><div dir="ltr">______________________<br>Mwendwa Kivuva, Nairobi, Kenya.<br><a href="http://twitter.com/lordmwesh" target="_blank">twitter.com/lordmwesh</a><br>
<div>google ID | Skype ID: lordmwesh</div></div></div>
<br><br><div class="gmail_quote">On 25 November 2013 14:02, Barrack Otieno <span dir="ltr"><<a href="mailto:otieno.barrack@gmail.com" target="_blank">otieno.barrack@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr"><div>Listers,<br><br></div>Emerging trends and security threats have forced people to start thinking of online security and child protection. I was listening to a colleague from Canada saying how citizens are increasingly getting comfortable with online surveillance. Africa has a very poor electronic commerce track record which might be linked to weak cyber cecurity as such we might want to strike a balance between freedom and responsibility online. Companies have stringent policies regarding the use of their Internet and network resources, iam tempted to imagine that we might require a stringent policy framework that can drive Africans towards maximizing on the potential of the internet, this becomes fuzzier when you analyse it from a perspective of the governments role.<br>
</div><div class="gmail_extra"><div><div class="h5"><br><br><div class="gmail_quote">On Tue, Nov 26, 2013 at 12:08 AM, Grace Githaiga <span dir="ltr"><<a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div><div dir="ltr">Thanks Ali and Liz for your responses and for raising further queries. We would also welcome recommendations. As of now, we will move your queries into our reporting template and will see what recommendations can be made in the final document. <div>
<br></div><div>Let us keep the debate live. </div><div>Rgds</div><div><span><font color="#888888">Grace<br></font></span><div><br></div><div><div><hr>Date: Mon, 25 Nov 2013 19:19:55 +0300<br>
Subject: Re: [ISOC_KE] Day 1: On-line debate on African Union Convention on Cyber Security (AUCC)<br>From: <a href="mailto:lizorembo@gmail.com" target="_blank">lizorembo@gmail.com</a><br>To: <a href="mailto:ali@hussein.me.ke" target="_blank">ali@hussein.me.ke</a><br>
CC: <a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a>; <a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>; <a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a></div>
<div><div><br><br><br>
Thanks GG for starting this discussion.<br>
Ali has raised very important points.<br>
The questions to ask here is, what is the cost of banning anonymous advertising in the cyberspace? Is it worth it? and How will it affect business both online and offline?<br>
<div>On Nov 25, 2013 3:46 AM, "Ali Hussein" <<a href="mailto:ali@hussein.me.ke" target="_blank">ali@hussein.me.ke</a>> wrote:<br><blockquote style="border-left:1px #ccc solid;padding-left:1ex">
<div dir="auto"><div>Grace and listers</div><div><br></div><div>1. Net Anonymity forms a cornerstone of how the Internet has evolved and grown to become the mass communication tool it is today. Although the proposals mean well in terms of trying to cap criminal activities it is a double edged sword. </div>
<div><br></div><div>a) How will whistle blowers be protected if they feel their identities will be compromised? </div><div>b) My right as a citizen to contribute in healthy sometimes sensitive political discourse in some cases require a certain level of anonymity.</div>
<div>c) How we counter needs of national security and personal freedoms without blanket condemnation of particular religious or ethnic groups will define us as a nation and continent.</div><div>d) We need to be very careful that we don't quash the very environment and ecosystem that has allowed some African countries to thrive and be thought leaders in the online space.</div>
<div><br><div><span>Ali Hussein</span></div><div><br></div><div style="font-family:Helvetica;font-size:medium"><a href="tel:%2B254%200770%20906375" value="+254770906375" target="_blank">+254 0770 906375</a> / <a href="tel:0713%20601113" value="+254713601113" target="_blank">0713 601113</a></div>
<div><span><br></span></div><div>"I fear the day technology will surpass human interaction. The world will have a generation of idiots". ~ Albert Einstein</div>
<div><span><br></span></div>Sent from my iPad</div><div><br>On Nov 25, 2013, at 12:39 AM, Grace Githaiga <<a href="mailto:ggithaiga@hotmail.com" target="_blank">ggithaiga@hotmail.com</a>> wrote:<br><br></div><blockquote>
<div>
<div dir="ltr"><p style="line-height:16.5pt">Good morning Listers<u></u><u></u></p>
<p style="line-height:16.5pt"><br></p><p style="line-height:16.5pt">Further to the announcement we made last Friday, we now commence this one week discussion on the
African Union Convention on Cyber Security(AUCC)</p><p style="line-height:16.5pt"><a href="http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf" target="_blank"><span style="color:#0068cf">http://pages.au.int/sites/default/files/AU%20Cybersecurity%20Convention%20ENGLISH_0.pdf</span></a><span> </span>on multiple lists of KICTANet and
ISOC-KE, in Kenya and on<span><span style="color:#cd232c"> </span></span>I-Network list moderated by the<span> </span>Collaboration on International ICT
Policy in East and Southern Africa<span style="color:#cd232c"> </span>(CIPESA)
and ISOC -Uganda.</p><p style="line-height:16.5pt"><br></p>
<p style="line-height:16.5pt"><b>Background to the African Union
Convention on Cyber Security (AUCC)</b><u></u><u></u></p>
<p style="line-height:16.5pt">African Union (AU) convention (52 page document) seeks to
intensify the fight against cybercrime across Africa in light of increase in
cybercrime, and a lack of mastery of security risks by African countries.
Further, that one challenge for African countries is lack of technological
security adequate enough to prevent and effectively control technological
and informational risks. As such “African States are in dire need of innovative
criminal policy strategies that embody States, societal and technical responses
to create a credible legal climate for cyber security”.<u></u><u></u></p>
<p style="line-height:16.5pt">The Convention establishes a framework for cybersecurity in
Africa “through organisation of electronic transactions, protection of personal
data, promotion of cyber security, e-governance and combating cybercrime”
(Conceptual framework).</p><p style="line-height:16.5pt"><br></p><p style="line-height:16.5pt">As an additional reference to the earlier ones, please find attached a letter that was sent to the AU by the Center for Intellectual Property and Information Technology law and Strathmore University school of law.</p>
<p style="line-height:16.5pt"><br></p><p style="line-height:16.5pt"><br></p>
<p style="line-height:16.5pt"><b>We begin the discussion with Part 1 on Electronic transactions. Today, we will discuss two out of four articles from this section.</b></p>
<p style="line-height:16.5pt"><b> </b><u></u><u></u></p>
<p style="line-height:16.5pt"><b>Section III: Publicity by electronic means</b><u></u><u></u></p>
<p style="line-height:16.5pt"><b> Article I – 7:</b><u></u><u></u></p>
<p style="line-height:16.5pt"><i> Without prejudice to Article I-4 any advertising
action, irrespective of its form, accessible through online communication service,
shall be clearly identified as such. It shall clearly identify the individual
or corporate body on behalf of whom it is undertaken.</i><u></u><u></u></p><p style="line-height:16.5pt"><i><br></i></p>
<p style="line-height:16.5pt"><b>Question:</b><span> </span>Should net
anonymity be legislated?<span> </span>If
so, what measures need to be or not be considered?<span> </span></p>
<p style="line-height:16.5pt"><b><br></b></p><p style="line-height:16.5pt"><b>Question:</b><span> </span>Should
individuals or companies be obliged to reveal their identities and what are the
implications? <u></u><u></u></p>
<p style="line-height:16.5pt"><b><br>
Article I – 8:</b><u></u><u></u></p>
<p style="line-height:16.5pt"><i>The conditions governing the possibility of promotional
offers as well as the conditions for participating in promotional
competitions or games where such offers, competitions or games are
electronically disseminated, shall be clearly spelt out and easily accessible.</i><u></u><u></u></p><p style="line-height:16.5pt"><i><br></i></p>
<b><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif">Question:</span></b><span><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif"> </span></span><span style="font-size:11pt;line-height:115%;font-family:Calibri,sans-serif">Should an<span> </span></span><span>international (or should we call it regional)<span><span style="color:#cd232c"> </span></span>law legislate on promotional offers and competitions
offered locally?<span> </span></span><div><span><br></span></div><div><span>Over to you Listers. Let us engage and make concrete suggestions.</span></div><div><span><br></span></div><div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px">A great week to you all.</span></font></div>
<div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px">Rgds</span></font></div><div><font face="Calibri, sans-serif"><span style="font-size:15px;line-height:17px">GG</span></font></div><div><span><br>
<br>
</span></div> </div>
</div></blockquote><blockquote><div><RECOMMENDATIONS ON AUCC.pdf></div></blockquote><blockquote><div><span>_______________________________________________</span><br><span>isoc mailing list</span><br>
<span><a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a></span><br><span><a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a></span><br>
</div></blockquote></div><br>_______________________________________________<br>
isoc mailing list<br>
<a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a><br>
<a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a><br>
<br></blockquote></div></div></div></div></div> </div></div>
<br>_______________________________________________<br>
isoc mailing list<br>
<a href="mailto:isoc@orion.my.co.ke" target="_blank">isoc@orion.my.co.ke</a><br>
<a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a><br>
<br></blockquote></div><br><br clear="all"><br></div></div><span class="HOEnZb"><font color="#888888">-- <br>Barrack O. Otieno<div>+254721325277</div><div>+254-20-2498789<br>Skype: barrack.otieno</div><div><a href="http://www.otienobarrack.me.ke/" target="_blank">http://www.otienobarrack.me.ke/</a>
</div>
</font></span></div>
<br>_______________________________________________<br>
isoc mailing list<br>
<a href="mailto:isoc@orion.my.co.ke">isoc@orion.my.co.ke</a><br>
<a href="http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc" target="_blank">http://orion.my.co.ke/cgi-bin/mailman/listinfo/isoc</a><br>
<br></blockquote></div><br></div>