<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"></head><body ><div><div></div><div>We have to admit that the principles and policies of the past have been changed by a revolution (digital revolution) middle men in markets are slowly being thrown to the rare as a end consumer. Time aa a factor in distribution and product delivery, processing has been reduced and the once necesary documentations required in commerce are mostly eliminated. All these as cool as it is has been intergrated into a world were financial services are more founded and targeted to a particular spcial class and tjerefore a sense of security that is much needed to a uninformed consumer is limited to those who are educated or in other words the socially politically and economically aware population. Yes we cannot blame anyone, just the market forces aligning to a most favourable conditions that guarantees success and competitiveness rather than having the services as a social development utility. </div><div><br></div><div><br></div><div><div style="font-size:75%;color:#575757">Sent from Samsung Mobile</div></div></div><br><br><br>-------- Original message --------<br>From: Gideon via kictanet <kictanet@lists.kictanet.or.ke> <br>Date: 22/07/2015 12:03 (GMT+03:00) <br>To: memakunat@yahoo.com <br>Cc: Gideon <gideonrop@gmail.com> <br>Subject: [kictanet] #KeIGF15 Online Discussions Day Three: Internet Economy <br> <br><br><div dir="ltr"><div class="gmail_default" style="font-family:arial,helvetica,sans-serif;font-size:small;color:rgb(0,0,0)">Listers,<br><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif;font-size:small;color:rgb(0,0,0)">First it will be good to know if the government has enough data on the eCommerce environment in Kenya. Thereafter such a study, it will be possible to create a better revenue analysis model that will allow the taxman to benefit at the same time enabling the govt to create a conducive environment to encourage and catalyze the Internet economy.<br><br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif;font-size:small;color:rgb(0,0,0)">Regards<br></div><div class="gmail_default" style="font-family:arial,helvetica,sans-serif;font-size:small;color:rgb(0,0,0)">Gideon Rop<br></div><div class="gmail_extra"><br><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi Barrack,<br>
Thank you for the the questions.<br>
@ Fred on the issue of taxation for the Internet economy....<br>
<br>
I was listening to a representative from Jumia the other day on radio. By<br>
her presentation, the volume of merchandise moved per day is quite high and<br>
this business is really catching on in Kenya. If I remember they had an<br>
increase of 900%in turnover in Africa. While they warn that the high sales<br>
have not yet translated into profit, the whole business model is<br>
interesting and at some point the government will want a share of the<br>
profits. The same will happen to the cloud economy and other Internet<br>
businesses, if what happened in Chicago is anything to go by.<br>
<br>
However, more needs to be done on consumer education and protection. For<br>
example, when one buys a phone online and it is faulty, should the online<br>
company collect, repair or replace the phone or should the consumer take<br>
the phone to the service centre?<br>
Consumer protection can either be done through self regulation where the<br>
online companies make very good policies on dealing with consumer<br>
complaints. Otherwise , the companies cannot be responsive, then the<br>
law/its enforcement must be strengthened.<br>
<br>
Regards,<br>
<br>
<br>
2015-07-22 7:42 GMT+03:00 Barrack Otieno via kictanet <<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>>:<br>
<br>
> Listers,<br>
><br>
> The rise of the Internet economy in Kenya has been defined by<br>
> different strokes. On one hand there are small entrepreneurs doing<br>
> their side hustles from offices, small shops and car boots. They<br>
> advertise their merchandise and services on social media and in a<br>
> rudimentary form, some deliver merchandise in backpacks from door to<br>
> door.<br>
> Enter the bigger players who have large websites from where goods and<br>
> services are purchased. Their business models differ. We have<br>
> companies like OLX, Cheki that provide a platform for users to<br>
> interact. They make their money from advertising. Others such as Rupu<br>
> and Jumia offer services and merchandise at reduced prices.<br>
><br>
> Questions<br>
><br>
> 1. Does an adequate legal framework exist to protect consumers from<br>
> fraud, deficient goods and services and to assure consumer rights in<br>
> the budding Internet economy?<br>
> 2. Since the bigger players in the sector are doing well, is time ripe<br>
> for the local Internet economy to be taxed to raise money for<br>
> government services?<br>
> 3. Should other services in the Internet economy such as cloud<br>
> services, international online purchases etc be taxed?<br>
> 4. As a stakeholder , what are your recommendations on how the<br>
> Internet economy can be improved?<br>
><br>
> The floor is open, feel free to continue contributing to the<br>
> discussions of the previous days.<br>
><br>
> _______________________________________________<br>
> kictanet mailing list<br>
> <a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
><br>
> Unsubscribe or change your options at<br>
> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/nmutungu%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/nmutungu%40gmail.com</a><br>
><br>
> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform<br>
> for people and institutions interested and involved in ICT policy and<br>
> regulation. The network aims to act as a catalyst for reform in the ICT<br>
> sector in support of the national aim of ICT enabled growth and development.<br>
><br>
> KICTANetiquette : Adhere to the same standards of acceptable behaviors<br>
> online that you follow in real life: respect people's times and bandwidth,<br>
> share knowledge, don't flame or abuse or personalize, respect privacy, do<br>
> not spam, do not market your wares or qualifications.<br>
><br>
<br>
<br>
<br>
--<br>
Grace L.N. Mutung'u<br>
Nairobi Kenya<br>
Skype: gracebomu<br>
Twitter: @Bomu<br>
<br>
<<a href="http://www.diplointernetgovernance.org/profile/GraceMutungu" rel="noreferrer" target="_blank">http://www.diplointernetgovernance.org/profile/GraceMutungu</a>><br>
-------------- next part --------------<br>
An HTML attachment was scrubbed...<br>
URL: <<a href="https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20150722/d8418f5e/attachment-0001.html" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20150722/d8418f5e/attachment-0001.html</a>><br>
<br>
------------------------------<br>
<br>
Message: 2<br>
Date: Wed, 22 Jul 2015 08:45:32 +0000 (UTC)<br>
From: Walubengo J <<a href="mailto:jwalu@yahoo.com">jwalu@yahoo.com</a>><br>
To: KICTAnet ICT Policy Discussions <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>><br>
Subject: Re: [kictanet] Anonymous hacks Kenya Defence Forces Twitter<br>
account<br>
Message-ID:<br>
<<a href="mailto:438978152.271039.1437554732948.JavaMail.yahoo@mail.yahoo.com">438978152.271039.1437554732948.JavaMail.yahoo@mail.yahoo.com</a>><br>
Content-Type: text/plain; charset="utf-8"<br>
<br>
@Liz,<br>
I consider security to be in the same league as insurance. No one wants to shoulder the cost of insurance since they believe disaster only happens to others. ?People take certain types of insurance (e.g. vehicle, employee, etc) seriously simply because the law mandates them to.<br>
That is why I agree with what Eng. J. Kariuki said as copied below. ?It is about the laws & regulations. In Kenya we are still awaiting the following security related laws:<br>
i) Data Protection Act (force data handlers to care for data collected)ii) e-Transaction Act (provide framework for electronic contracts/transcations)iii) Cybercrime Act (provide comprehensive framework for investigation, handling and prosecuting e-Crimes)iv) Access to Information Act(formerly Freedom of Info Act)-provide framework of government to disclose/share public interest data.<br>
Unless and until the above legal regime kicks in, we shall remain the weakest link in the global chain of defence against cybercrime.<br>
walu.?<br>
<br>
??<br>
From: Liz Orembo via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>><br>
To: <a href="mailto:jwalu@yahoo.com">jwalu@yahoo.com</a><br>
Cc: Liz Orembo <<a href="mailto:lizorembo@gmail.com">lizorembo@gmail.com</a>><br>
Sent: Wednesday, July 22, 2015 10:02 AM<br>
Subject: Re: [kictanet] Anonymous hacks Kenya Defence Forces Twitter account<br>
<br>
<br>
Listers,<br>
<br>
For the day 2 KeIGF online discussion on Cyber Security and Trust, allow me to take you back to last year KICTANet's thread when anonymous Kenya hacked KDF Twitter accounts. Key issues were raised with no follow ups. 1.The govt not consulting local talent which has skills and capacity and 2. appreciation of digital security risks by various industries. It seems like nothing much has changed. How do we take it forward?<br>
<br>
<br>
On Mon, Jul 21, 2014 at 8:22 PM, John Kariuki via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br>
<br>
<br>
<br>
Matunda,Listers,You are right.Breaches on cyber security need serious attention.<br>
The ICT Policy in 2006 summarized the matter as follows:<br>
"Electronic Security: The challenge is for the country to establish an adequate legal framework and capacity to deal with national security,network security,cyber-crime and cyber-terrorism; and to establish mechanisms for international cooperation to combat cross-border crimes.An e-security structure will be developed in collaboration with the relevant institutions." ? Since 2006, matters the situation has become even worse than envisaged at that time due to increasing use of on-line services and Broadband Networks.<br>
John Kariuki<br>
<br>
On Monday, 21 July 2014, 17:38, Matunda Nyanchama via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br>
<br>
<br>
<br>
On this score, I have made some observations:<br>
- our people don't take seriously such breaches; I read an attitude of this sort: "it is a small irritant that will come." This is especially so for the public sector but also (to a small extent) private sector. Indeed, organizations like banks can afford to underwrite huge losses through marginal variation in interest rates.<br>
- there is no concerted effort to develop needed skills in this area in order to tackle/forestall such problems. With such skills in mind we would design, implement and continually monitor and respond to incidents based on best practices. (Note: there are no guarantees that one won't be hacked but one can minimize such damage as: reputation, loss/modification of information, etc.)<br>
- we seriously need leadership in this space nationally (both in public and private sectors); if there exists any, it is not felt. Such leadership would be evangelistic in nature pushing for appreciation of such risks and how to deal with them. Such awareness would raise concern (hopefully) and thus assure allocation of commensurate resources (people, money, technology, etc.) to confront the problem. (NB: my experience in North America tells me that this area is very much underfunded and whatever little funding comes through would be spent on easy to acquire stuff like CCTV ... some installed without requisite processes, skills, etc for maximum gain (ROI) ...)<br>
- many technology managers (and many others in management) treat security with obscurity. Keep things obscure and profess security. I once was in a discussion with a senior official in GoK and heard things such as: we cannot disclose what measures we have taken to protect government information because the same can be used by you people to target us! He failed to appreciate that you can still be hacked with use of known reconnaissance approaches. OK: if you really want help, get some of our top talent, give them security clearance and allow them to build robust systems that assure security.<br>
- a friend recently gave the story of a manager (a protege of top management) that kept his job, protected by his benefactors but who many knew wasn't performing. This manager could continually avoid bringing in talent that might help him but which talent may also expose his failing! Only when the organization was hit and top management embarrassed with loss (material, reputational) did they hire an external consultant whose report exposed the manager's fraud that he had perpetuated for years on end! ... long story short, he was given a soft landing, and slowly eased out of the organization. ... Lesson: get the right talent and skills for the job if indeed you are committed to delivering in your mandate.<br>
BTW: we are into consulting and training in this area. I know of bids we have lost on (despite presenting the best technical proposals)??because of other considerations. Your guess is as good as mine as to why, but don't be surprised to have some "wired/connected" individuals winning security assignments but which they can't deliver on; and if they do, the result would be sloppy and why ... because they engage unskilled people ....<br>
- Finally (for now), the compliance regime is extremely weak! I know a thing or two about the Auditor General's office and information security skills isn't one of their strengths. The focus on financial audit (recently they reported Kshs 300 + billion unaccounted for) takes all the attention while other aspects go unattended: critical infrastructure protection, ICT specification/acquisition/deployment/management/.../disposal ... all go unattended.<br>
... there is a lot to say; let this suffice for today.?<br>
?----------------------------------------------------------------------------------------------<br>
Matunda Nyanchama, PhD, CISSP; <a href="mailto:mnyanchama@aganoconsulting.com">mnyanchama@aganoconsulting.com</a><br>
Agano Consulting Inc.;? <a href="http://www.aganoconsulting.com" rel="noreferrer" target="_blank">www.aganoconsulting.com</a>; Twitter:?nmatunda;? Skype: okiambe<br>
----------------------------------------------------------------------------------------------Manage your ICT risks! We are the experts you need! The trusted partners you deserve!Call: <a href="tel:%2B1-888-587-1150" value="+18885871150">+1-888-587-1150</a> (Canada) <a href="tel:%2B254-20-267-0743" value="+254202670743">+254-20-267-0743</a> (Kenya)?or info@aganoconsulting.comLicensed by Communications Commission of Kenya (CCK)?----------------------------------------------------------------------------------------------"The best revenge is massive success" - Frank Sinatra-----------------------------------------------------------------------------------------------<br>
This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.<br>
<br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/ngethe.kariuki2007%40yahoo.co.uk" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/ngethe.kariuki2007%40yahoo.co.uk</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
<br>
<br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/lizorembo%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/lizorembo%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
<br>
<br>
<br>
<br>
--<br>
Best regards.<br>
<br>
Patience is what you admire in the driver behind you, but not in the one ahead.<br>
<br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
<br>
<br>
-------------- next part --------------<br>
An HTML attachment was scrubbed...<br>
URL: <<a href="https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20150722/fed87c9a/attachment.html" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20150722/fed87c9a/attachment.html</a>><br>
<br>
------------------------------<br>
<br>
Subject: Digest Footer<br>
<br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
<br>
------------------------------<br>
<br>
End of kictanet Digest, Vol 98, Issue 38<br>
****************************************<br>
</blockquote></div><br></div></div>
</body>