<div dir="ltr"><div><div><br clear="all"></div><font size="2">Dear listers,<br><br></font></div><font size="2">Today we begin our online discussions on digital privacy.<br></font><div><div><font size="2"><br></font><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">By electing a government, we give it a responsibility to protect our security and in the course of that, they make policies by which our data is collected and used. <br></span></font></p><p dir="ltr" style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><font size="2"><br><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline"></span></font></p><p style="line-height:1.2;margin-top:0pt;margin-bottom:0pt"><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">Nanjira had shared a CIGI-IPSOS research (<a href="http://ipsos-na.com/news-polls/pressrelease.aspx?id=7159">here</a>) on digital security and trust done early this year which found out that:</span></font></p><ul><li><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">75% of Kenyans </span>law enforcement agencies should have a right to access the content of
their citizens’ online communications for valid national security
reasons</font></li><li><font size="2">66% agreed that tech companies should not build technologies that prevent the law enforcement agencies from accessing the content of their communication.<br></font></li></ul><font size="2"><br></font><ol style="margin-top:0pt;margin-bottom:0pt"><li style="list-style-type:decimal;font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline"><p style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">Are ‘National security’ and ‘terrorism’ being used as a means to justify government breaches of security?</span></font></p></li><li style="list-style-type:decimal;font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline"><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">Is
data collection proportionate and justified? And how
secure are our government's’ information systems from other parties</span></font></li><li style="list-style-type:decimal;font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline"><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">How can the tech industry work with the government on security while ensuring people's right to privacy are not infringed?</span></font></li><li style="list-style-type:decimal;font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline"><font size="2"><span style="font-family:Calibri;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline">What are your concerns on government collection of data and surveillance?<br></span></font></li></ol><br><br></div><div><font size="2">Karibuni.</font><br></div><div><div>-- <br><div class="gmail_signature"><div dir="ltr"><div><br><div><font style="font-family:comic sans ms,sans-serif" face="arial, helvetica, sans-serif" size="2">Best regards.<br>
</font></div>
<div><font style="font-family:comic sans ms,sans-serif" face="arial, helvetica, sans-serif" size="2"><font face="arial, helvetica, sans-serif">Liz.</font><br>
</font></div>
<font size="2"><font style="font-family:comic sans ms,sans-serif" face="arial, helvetica, sans-serif"><br>
P<font face="arial, helvetica, sans-serif">GP ID: </font>0x1F3488BF</font></font></div></div></div>
</div></div></div></div>