<div dir="ltr"><span style="font-size:12.8px">Dear Listers,</span><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">Thank you for your contribution on yesterdays discussions on the offences, feel free to still comment on it under that mail stream posted by Barrack yesterday.</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">Today we discuss the Investigation Procedures of this bill. It outlines the powers and procedures to be followed by the authorities in carrying out computer and cyber related offences investigations.</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">This section touches on pertinent issues as outlined below:</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px"><div>20 — Scope of procedural provisions</div><div>21 — Search and seizure of stored computer data</div><div>22 — Power to search without a warrant in special circumstances</div><div>23 — Record of and access to seized data</div><div>24 — Production order</div><div>25 — Expedited preservation and partial disclosure of traffic data</div><div>26 — Real-time collection of traffic data</div><div>27 — Interception of content data</div><div>28 — Obstruction and misuse</div><div>29 — Appeal</div><div>30 — Confidentiality and limitation of liability</div></div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px">You can access the bill here: <a href="http://www.mygov.go.ke/?p=11234" rel="noreferrer" target="_blank" style="font-size:12.8px">http://www.mygov.go.ke/?p=11234</a> or download the attached document.</div><div style="font-size:12.8px"><br></div><div style="font-size:12.8px"><u><b>The Concerns</b></u></div><div style="font-size:12.8px"><p>1.<span style="font-stretch:normal;font-size:7pt;font-family:'times new roman'"> </span> To what extent are the service providers supposed to disclose their client data to the authorities?</p><div></div><p></p><p>2.<span style="font-stretch:normal;font-size:7pt;font-family:'times new roman'"> </span>Does any of the search or seizure powers given to authorities in this section violate any privacy rights enshrined in our constitution?</p><p>3. Has this part extensively covered all the investigation procedures required for all the offences stated in part II?</p><p>4. Does it match the international standards? If it does not, kindly point out areas that need to be incorporated into the bill.</p><p>N/B: Feel free to raise any concern or question not suggested here.</p><p><br></p><p>We are looking forward to your feedback on the above concerns and much more.</p><p>Thank you. </p><div></div><p></p><div>Barrack and Karis.</div></div><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div>Best Regards,<br><br></div></div></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px"><div><div><div><div><font size="2">Kelvin Kariuki</font></div></div></div></div><div><div><div><div><font size="2">Twitter Handle: @teacherkaris</font></div></div></div></div><div><div><div><font size="2">Alt email: <a href="mailto:kkariuki@mmu.ac.ke" target="_blank">kkariuki@mmu.ac.ke</a></font></div></div></div><div><div><font size="2">Mobile: +2547 29 385 557</font></div></div></blockquote></div></div>
</div>