<p dir="ltr">Hey Listers, <br>
I have waited for this chance since the Bill was first shared. As a human rights advocate, my eyes were after clauses that are likely to be abused to limit rights and fundamental freedoms. I was able to come across some provisions which are likely to limit Art 31.<br>
Section 22, the power to search without a warrant and to confiscate a computer will be abused. In the past they have done that and this provision will just empower the powers at be to do it more on those who have dissenting opinions.<br>
Section 24(6) this provision requires a police officer to just apply to the I.G for an order to compel a service provider or a data custodian to share your data. This provision is likely to be abused.<br>
Section 25, I wonder at what point will the officers seek leave of the court for the preservation and disclosure to take place?<br>
Section 26 & 27 are on the need of a court order to allow ones communications to be intercepted. Still, doesn't sit well with me. For how long will ones rights to privacy be limited? I feel like this provision is likely to be abused.<br>
One can appeal according to Section 29, but how will one know that their communications are being intercepted? <br>
These provisions give too much power to security agencies.</p>
<div class="gmail_quote">On Jul 26, 2016 8:05 AM, "Kelvin Kariuki via kictanet" <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><span style="font-size:12.8px">Dear Listers,</span><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">Thank you for your contribution on yesterdays discussions on the offences, feel free to still comment on it under that mail stream posted by Barrack yesterday.</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">Today we discuss the Investigation Procedures of this bill. It outlines the powers and procedures to be followed by the authorities in carrying out computer and cyber related offences investigations.</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">This section touches on pertinent issues as outlined below:</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px"><div>20 — Scope of procedural provisions</div><div>21 — Search and seizure of stored computer data</div><div>22 — Power to search without a warrant in special circumstances</div><div>23 — Record of and access to seized data</div><div>24 — Production order</div><div>25 — Expedited preservation and partial disclosure of traffic data</div><div>26 — Real-time collection of traffic data</div><div>27 — Interception of content data</div><div>28 — Obstruction and misuse</div><div>29 — Appeal</div><div>30 — Confidentiality and limitation of liability</div></div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">You can access the bill here: <a href="http://www.mygov.go.ke/?p=11234" rel="noreferrer" style="font-size:12.8px" target="_blank">http://www.mygov.go.ke/?p=11234</a> or download the attached document.</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px"><u><b>The Concerns</b></u></div><div style="font-size:12.8px"><p>1.<span style="font-stretch:normal;font-size:7pt;font-family:'times new roman'"> </span> To what extent are the service providers supposed to disclose their client data to the authorities?</p><div></div><p></p><p>2.<span style="font-stretch:normal;font-size:7pt;font-family:'times new roman'"> </span>Does any of the search or seizure powers given to authorities in this section violate any privacy rights enshrined in our constitution?</p><p>3. Has this part extensively covered all the investigation procedures required for all the offences stated in part II?</p><p>4. Does it match the international standards? If it does not, kindly point out areas that need to be incorporated into the bill.</p><p>N/B: Feel free to raise any concern or question not suggested here.</p><p><br></p><p>We are looking forward to your feedback on the above concerns and much more.</p><p>Thank you. </p><div></div><p></p><div>Barrack and Karis.</div></div><div><br></div>-- <br><div data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div>Best Regards,<br><br></div></div></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px"><div><div><div><div><font size="2">Kelvin Kariuki</font></div></div></div></div><div><div><div><div><font size="2">Twitter Handle: @teacherkaris</font></div></div></div></div><div><div><div><font size="2">Alt email: <a href="mailto:kkariuki@mmu.ac.ke" target="_blank">kkariuki@mmu.ac.ke</a></font></div></div></div><div><div><font size="2">Mobile: +2547 29 385 557</font></div></div></blockquote></div></div>
</div>
<br>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/monyango93%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/monyango93%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div>