<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>Walu</div><div><br></div><div>Thanks for bringing this issue of selective amnesia or ignoring certain discussions. For example I have specifically asked about three issues that should be close to our hearts because it affects us directly. I'm left with  no choice but to continue raising them until I get a satisfactory answer. Please note that these answers may not necessarily be what I'm looking for but at least they will have been addressed. Three issues that I feel now require the direct intervention of the CS himself.</div><div><br></div><div>1. I'm happy to repost my question about whether or not the Government will accede and sign the new ITRs which we declined to sign in Dubai 2012. Incase the CS may have missed it due to his busy schedule.</div><div><br></div><div>2. The issue of universal access. Now is even a more urgent time to address this issue as the recent global rankings give us dismal points.</div><div><br></div><div>3. Lastly, maybe its time that the ICT Ministry debunk policy formulation from the CCK back to the parent ministry.  <br><br><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373);">Ali Hussein</span></div><div><br></div><div style="font-family: Helvetica; font-size: medium; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto; ">+254 0770 906375 / 0713 601113</div><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); "><br></span></div><div>"I fear the day technology will surpass human interaction. The world will have a generation of idiots".  ~ Albert Einstein</div><div><span style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373);"><br></span></div>Sent from my iPad</div><div><br>On Nov 27, 2013, at 10:22 AM, Walubengo J <<a href="mailto:jwalu@yahoo.com">jwalu@yahoo.com</a>> wrote:<br><br></div><blockquote type="cite"><div><span></span><br><span>+1,</span><br><span></span><br><span>Listers, what more endorsement do you need. </span><br><span></span><br><span>Unleash your comments on the AU Cybersecurity Convention that is due to be signed by the President early next year. Lets not make noise after the fact when you have been requested to speak up but kept quiet.</span><br><span></span><br><span>On the other hand, government should be ready to explain at a domestic level when and why they feel it necessary to ignore certain Listers input. We want to avoid the Dubai ITU/WCIT standoff :-)</span><br><span></span><br><span>walu.</span><br><span></span><br><span></span><br><span></span><br><span></span><br><span></span><br><span></span><br><span>------------------------------</span><br><span>On Wed, Nov 27, 2013 5:34 AM AST (Arabian) Fred Matiangi wrote:</span><br><span></span><br><blockquote type="cite"><span>Good morning Listers,</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span>I have been following the on-going discussion of the  proposed AU</span><br></blockquote><blockquote type="cite"><span>convention with keen interest and excitement, especially because this is</span><br></blockquote><blockquote type="cite"><span>precisely how we will end up enriching and strengthening it. I pumped into</span><br></blockquote><blockquote type="cite"><span>John Walubengo last evening and proposed that  perhaps in a week or two we</span><br></blockquote><blockquote type="cite"><span>should have a brief brainstorm bringing together all interested parties so</span><br></blockquote><blockquote type="cite"><span>we can concretise our 'Kenya Position' on this convention. Further to this</span><br></blockquote><blockquote type="cite"><span>conversation, I asked my colleagues Victor and Eunice at the ICTA and</span><br></blockquote><blockquote type="cite"><span>Francis Wangusi at CCK to explore possibilities of collating all the ideas</span><br></blockquote><blockquote type="cite"><span>emanating from this forum and setting up a sit down to tie up our</span><br></blockquote><blockquote type="cite"><span>discussions a head of the Heads of State Summit in January.</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span>Grace- I very sincerely appreciate the initiative to drive this discussion</span><br></blockquote><blockquote type="cite"><span>and look forward to further engagement.</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span>Good day.</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span>Fred</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span>On Tue, Nov 26, 2013 at 9:23 PM, Grace Githaiga <<a href="mailto:ggithaiga@hotmail.com">ggithaiga@hotmail.com</a>>wrote:</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Good morning Listers*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Today, we move onto PART II: PERSONAL DATA PROTECTION and will tackle</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>four questions.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Objectives of this Convention with respect to personal data*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Article II – 2:*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Each Member State of the African Union shall put in place a legal</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>framework with a view to establishing a mechanism to combat breaches of</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>private life likely to arise from the gathering, processing, transmission,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>storage and use of personal data.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*The mechanism so established shall ensure that any data processing, in</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>whatsoever form, respects the freedoms and fundamental rights of physical</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>persons while recognizing the prerogatives of the State, the rights of</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>local communities and the target for which the businesses were established.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Question:* *What is the relevance of this article? What are these state</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>prerogatives? And given the increased interest of state surveillance, how</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>can states balance respect of FOE while recognising state prerogatives? *</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Article II-6, II-7, 11-8, II-11, II-12, II-13 refer to a Protection</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Authority* which is meant to establish standards for data protection.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Article II – 14 *provides for each Member State of the African Union to</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>establish an authority with responsibility to protect personal data.  It* *shall</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>be an independent administrative authority with the task of ensuring that</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>the processing of personal data is conducted in accordance with domestic</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>legislations.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Further,  article II-17 states that ‘*Sworn agents may be invited to</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>participate in audit missions in accordance with extant provisions in</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Member States of the African Union’.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Question:* *Considering that this article seems to be tied to the</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Protection Authority, what is its relevance? And who is a ‘sworn</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>agent?’ What should this authority look like in terms of its composition? *</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Article II – 20:*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*…Members of the protection authority shall not receive instructions from</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>any authority in the exercise of their functions. *</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Article II – 21:*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span> *Member States are engaged to provide the national protection authority</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>human, technical and financial resources necessary to accomplish their</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>mission.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Question:* *It appears that this Data Protection Authority is envisaged</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>to be fully government supported. Therefore, should we be talking of its</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>independence? In what way should this article be framed so that it ensures</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>independence of the Authority?*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Article II – 28 to II-34 *outlines six principles governing the</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>processing of personal data namely:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Consent and of legitimacy,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Honesty,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Objective, relevance and conservation of processed personal data,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span> Accuracy,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Transparency and</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span> Confidentiality and security of personal data.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Under each of the specific principles, detailed explanation of how each</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>should be undertaken is offered.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Question:* *Is this explanation and detailing of how to undertake each</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>necessary in an international (regional) law necessary or needed? Is this</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>legislation overkill?*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>*Lets get your views on data protection concerns.*</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Rgds</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>GG</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>_______________________________________________</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>kictanet mailing list</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Unsubscribe or change your options at</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span><a href="https://lists.kictanet.or.ke/mailman/options/kictanet/fredmatiangi%40gmail.com">https://lists.kictanet.or.ke/mailman/options/kictanet/fredmatiangi%40gmail.com</a></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>for people and institutions interested and involved in ICT policy and</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>regulation. The network aims to act as a catalyst for reform in the ICT</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>sector in support of the national aim of ICT enabled growth and development.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>KICTANetiquette : Adhere to the same standards of acceptable behaviors</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>online that you follow in real life: respect people's times and bandwidth,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>share knowledge, don't flame or abuse or personalize, respect privacy, do</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>not spam, do not market your wares or qualifications.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><span></span><br><span></span><br><span>_______________________________________________</span><br><span>kictanet mailing list</span><br><span><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a></span><br><span><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a></span><br><span></span><br><span>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com">https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com</a></span><br><span></span><br><span>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.</span><br><span></span><br><span>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</span></div></blockquote></body></html>