<div dir="ltr">If there was a real intention to share the document, it would have been available to listers and the wider public by now. For unknown reasons this invitation looks more of off-ward PR than a genuine call for stakeholder participation. You can clearly infer this by trying to access the document in question from ICTA site <a href="http://www.icta.go.ke/invitation-for-stakeholders-to-input-into-the-draft-cyber-security-strategy-2014/">http://www.icta.go.ke/invitation-for-stakeholders-to-input-into-the-draft-cyber-security-strategy-2014/</a>. You will be tossed back and forth through inactive links until you doze off. What ceremony does it take an organization that is supposed to be setting the pace in ICT to upload a few pages document?<br>
<br></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Mar 14, 2014 at 3:48 PM, Victor Kapiyo <span dir="ltr"><<a href="mailto:vkapiyo@gmail.com" target="_blank">vkapiyo@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Hi Phyllis,<div><br></div><div>The DL link appears to be broken.</div><div><br></div><div>Victor</div></div>
<div class="gmail_extra"><br clear="all"><div><div dir="ltr"><div><span style="color:rgb(102,102,102);font-family:tahoma,sans-serif">Victor Kapiyo, LL.B</span></div>
<font color="#666666" face="tahoma, sans-serif"><br>====================================================<br><i>“Your attitude, not your aptitude, will determine your altitude” Zig Ziglar</i></font><br></div></div>
<br><br><div class="gmail_quote"><div><div class="h5">On 14 March 2014 14:42, Phyllis Nyambura <span dir="ltr"><<a href="mailto:pnyambura@ict.go.ke" target="_blank">pnyambura@ict.go.ke</a>></span> wrote:<br></div></div>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="h5">
<div dir="ltr"><div><p class="MsoNormal" style="line-height:13.5pt"><span style="font-size:10pt;font-family:Tahoma,sans-serif;color:rgb(51,51,51)">Listers,</span></p><p class="MsoNormal" style="line-height:13.5pt"><span style="color:rgb(51,51,51);font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt"><br>
</span></p><p class="MsoNormal" style="line-height:13.5pt"><span style="color:rgb(51,51,51);font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt">You can now participate in the review of the
Draft Cyber Security Strategy by sending your comments to </span><b style="color:rgb(51,51,51);font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt"><a href="mailto:cybersecuritystrategy@ict.go.ke" target="_blank">cybersecuritystrategy@ict.go.ke</a></b><span style="color:rgb(51,51,51);font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt"> by </span><b style="color:rgb(51,51,51);font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt">Friday, 28th March, 2014.</b><span style="color:rgb(51,51,51);font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt"> Download the Draft Cybersecurity Strategy
at </span><span style="font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt;color:rgb(59,89,152)"><a href="http://upload.facebook.com/l.php?u=http%3A%2F%2Fgoo.gl%2F6CyMRO&h=2AQHX7RG1&enc=AZPTQ960_uOUKmgCCg2Q7QFmuY5Qofjjg-grXNftlMWRBEpJGBc0lGpvotsr-ID_baxZflHf_SvpCCp6oYkle246z0a1EO90nkunZTRDdGBIHOXyurBouuA5J6jhkwzh4DXU0cN9JHvijz9mKB5gdcOi&s=1" style="font-family:Tahoma,sans-serif;font-size:10pt;line-height:13.5pt" target="_blank">http://goo.gl/6CyMRO</a></span><br>
</p><p class="MsoNormal" style="line-height:13.5pt"><br></p>
<p class="MsoNormal" style="line-height:13.5pt"><span style="font-size:10pt;font-family:Tahoma,sans-serif;color:rgb(51,51,51)">The strategy, prepared by the Ministry of ICT will
address loopholes in Information Security. It is aimed at providing the
Government with the implementation plans to protect Kenya’s ICT cyber assets.<br>
<br>
<b>Why should you do so?</b> <br>
<br>
Even with current investments in ICT by the government, banking and
telecommunications sectors, there are still serious security loopholes and most
organizations do not factor the possible risks while setting up systems. With
evidence of increasing online vulnerabilities, the Government of Kenya (GoK)
and leaders in the private sector need to make improvements to their
Cybersecurity infrastructure. Private and public organizations are required to
invest in information security systems to prevent hackers from accessing their
networks, systems and data.<br>
<br>
<b>Outcome:</b> Comprehensive new strategy
document that will guide the management of Cybersecurity issues in the country.<br>
<br>
You can also write to:<br>
The Principal Secretary,<br>
Ministry of Information, Communications and Technology,<br>
P.O. Box 30095-00100,<br>
Nairobi, Kenya</span></p></div><div><br></div><div><br></div><br clear="all"><div><br></div>Kind Regards,<br><div dir="ltr"><font face="trebuchet ms, sans-serif">Phyllis Nyambura<br>Communication <br>The ICT Authority<br>
<br>Telposta Towers, 12th Floor, Kenyatta Ave<br>P.O. Box 27150 - 00100 Nairobi, Kenya<br>t: <a href="tel:%2B%20254-020-2211960" value="+254202211960" target="_blank">+ 254-020-2211960</a>/62 | m: <a href="tel:%2B%20254%20%280%29%20789396433" value="+254789396433" target="_blank">+ 254 (0) 789396433</a> | e: <a href="mailto:pnyambura@ict.go.ke" target="_blank">pnyambura@ict.go.ke</a><br>
<br>Visit: <a href="http://www.ict.go.ke/" target="_blank">www.ict.go.ke</a><span style="padding-right:16px;width:16px;min-height:16px"></span><span style="padding-right:16px;width:16px;min-height:16px"></span><br>
Become a fan: <a href="http://www.facebook.com/kenyaictboard" target="_blank">www.facebook.com/ICTAuthorityKE </a><br>
Follow us on twitter: @ICTAuthorityKE<br>---------------------<br></font><br></div>
</div>
<br>
<table style="border-collapse:collapse" border="0" cellpadding="0" cellspacing="0">
<tbody><tr>
<td style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt" valign="top" width="319">
<p><span style="font-size:8.0pt;color:#5c5c5c" lang="EN-GB">ICT Authority</span></p>
<p><span style="font-size:8.0pt;color:#5c5c5c" lang="EN-GB">Telposta Towers 12<sup>th</sup>
Floor, Kenyatta Ave</span></p>
<p><span style="font-size:8.0pt;color:#5c5c5c" lang="EN-GB">PO Box 27150 - 00100 Nairobi Kenya</span></p>
<p><span style="font-size:8.0pt;color:#5c5c5c" lang="EN-GB">Tel: <a href="tel:%2B254%2020%202089061" value="+254202089061" target="_blank">+254 20 2089061</a> </span></p>
<p><span style="font-size:8.0pt;color:#5c5c5c" lang="EN-GB"><a href="http://www.icta.go.ke" target="_blank">www.icta.go.ke</a></span></p>
</td>
<td style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt" valign="top" width="319">
<p><img src="https://docs.google.com/a/ict.go.ke/viewer?attid=0.2&pid=gmail&thid=1410d1b473710e30&url=https%3A%2F%2Fmail.google.com%2Fmail%2Fu%2F0%2F%3Fui%3D2%26ik%3D601193107c%26view%3Datt%26th%3D1410d1b473710e30%26attid%3D0.2%26disp%3Dsafe%26realattid%3Df_hktixyri1%26zw&docid=01d32a8f69151f9b50b1d7f49031b7e9%7C88a8639d29402c25c3ac45049b346460&a=bi&pagenumber=1&w=138" style="font-size:1.3em"><span style="font-size:8.0pt;color:#5c5c5c" lang="EN-GB"></span></p>
</td>
</tr>
</tbody></table><br></div></div>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/vkapiyo%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/vkapiyo%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br></div>
<br>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/kamothonjenga%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/kamothonjenga%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br></div>