<html xmlns="http://www.w3.org/1999/xhtml" xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office"><head><!--[if gte mso 9]><xml><o:OfficeDocumentSettings><o:AllowPNG/><o:PixelsPerInch>96</o:PixelsPerInch></o:OfficeDocumentSettings></xml><![endif]--></head><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px"><div id="yui_3_16_0_ym19_1_1469709829338_7739"><span>@Karis,</span></div><div id="yui_3_16_0_ym19_1_1469709829338_7740"><span><br></span></div><div><span>Apologies for late intervention.</span></div><div id="yui_3_16_0_ym19_1_1469709829338_7741"><span><br></span></div><div id="yui_3_16_0_ym19_1_1469709829338_7706">Just looked at the Investigation Procedures and just have a concern in terms of 'who' does them. Whereas it is envisioned that a police officer would carry these out, it would have been better to qualify this in terms of a 'cyber-police' officer.</div><div id="yui_3_16_0_ym19_1_1469709829338_7705"><br></div><div id="yui_3_16_0_ym19_1_1469709829338_7652">Moving in and grabbing computer related equipment and data as if you are confiscating a sack of bhang may render the data useless or not-acceptable in a court of law since the defence lawyers may argue that there was <a class="edited-link-editor enhancr2_6e47f177-f710-493b-57dd-bd0068409f0b" href="http://www.csoonline.com/article/2118807/investigations-forensics/how-to-keep-a-digital-chain-of-custody.html" id="yui_3_16_0_ym19_1_1469709829338_7994">no chain of custody</a> with respect to the seized digital evidence.</div><div><br></div><div id="enhancr2_6e47f177-f710-493b-57dd-bd0068409f0b" class="yahoo-link-enhancr-card ymail-preserve-class ymail-preserve-style" style="font-family:'Helvetica Neue', Helvetica,Arial,sans-serif; width:288px; display:inline-block; margin: 5px 5px 5px 0;" contenteditable="false" data-url="http://www.csoonline.com/article/2118807/investigations-forensics/how-to-keep-a-digital-chain-of-custody.html" data-type="yenhancr" data-category="article" data-embed-url="" data-size="mini" dir="ltr"> <a href="http://www.csoonline.com/article/2118807/investigations-forensics/how-to-keep-a-digital-chain-of-custody.html" style="text-decoration: none !important;" class="yahoo-enhancr-cardlink" target="_blank" rel="noreferrer"> <table class="card yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" width="288" height="80" style="border:1px solid #e0e4e9;width:288px;border-right:3px solid #000000;background-color:#fff;"> <tbody><tr> <td width="80px" style="width:80px;background-color:#000;"> <img src="https://s.yimg.com/vv//api/res/1.2/gxG6_WQyMEarqd6R6Np8Kw--/YXBwaWQ9bWFpbDtmaT1maWxsO2g9ODA7dz04MA--/http://idge.staticworld.net/cso/CSO_logo_300x300.png.cf.jpg" width="80" height="80" style="width:80px; vertical-align:middle;"> </td> <td> <h2 class="card-title" style="font-size:13px;color:#000000;font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;text-decoration:none !important;margin:4px 0 4px 10px;word-break:break-word;">How to Keep a Digital Chain of Custody</h2> </td> <td class="card-share-container"></td> </tr> </tbody></table> </a></div><div id="yui_3_16_0_ym19_1_1469709829338_8066"><br></div><div id="yui_3_16_0_ym19_1_1469709829338_7652"><br></div><div id="yui_3_16_0_ym19_1_1469709829338_7652">walu. </div><div class="qtdSeparateBR" id="yui_3_16_0_ym19_1_1469709829338_7432"><br><br></div><div class="yahoo_quoted" id="yui_3_16_0_ym19_1_1469709829338_7466" style="display: block;"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;" id="yui_3_16_0_ym19_1_1469709829338_7465"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 16px;" id="yui_3_16_0_ym19_1_1469709829338_7464"> <div dir="ltr" id="yui_3_16_0_ym19_1_1469709829338_7463"> <font size="2" face="Arial" id="yui_3_16_0_ym19_1_1469709829338_7470"> <hr size="1" id="yui_3_16_0_ym19_1_1469709829338_7499"> <b><span style="font-weight:bold;">From:</span></b> Kelvin Kariuki <kelvinkariuki89@gmail.com><br> <b><span style="font-weight: bold;">To:</span></b> KICTAnet ICT Policy Discussions <kictanet@lists.kictanet.or.ke> <br><b><span style="font-weight: bold;">Cc:</span></b> Barrack Otieno <otieno.barrack@gmail.com>; Grace Githaiga <ggithaiga@hotmail.com>; Grace Luice N. Mutung'u <nmutungu@gmail.com>; Walubengo J <jwalu@yahoo.com><br> <b><span style="font-weight: bold;">Sent:</span></b> Tuesday, July 26, 2016 8:04 AM<br> <b><span style="font-weight: bold;">Subject:</span></b> Computer and Cyber crimes bill 2016 Day 2 of 5 Part III Investigation Procedures<br> </font> </div> <div class="y_msg_container" id="yui_3_16_0_ym19_1_1469709829338_7500"><br><div id="yiv7878604428"><div dir="ltr" id="yui_3_16_0_ym19_1_1469709829338_7527"><span style="font-size:12.8px;">Dear Listers,</span><div style="font-size:12.8px;" id="yui_3_16_0_ym19_1_1469709829338_7563"><br></div><div style="font-size:12.8px;">Thank you for your contribution on yesterdays discussions on the offences, feel free to still comment on it under that mail stream posted by Barrack yesterday.</div><div style="font-size:12.8px;"><br></div><div style="font-size:12.8px;">Today we discuss the Investigation Procedures of this bill. It outlines the powers and procedures to be followed by the authorities in carrying out computer and cyber related offences investigations.</div><div style="font-size:12.8px;"><br></div><div style="font-size:12.8px;">This section touches on pertinent issues as outlined below:</div><div style="font-size:12.8px;"><br></div><div style="font-size:12.8px;" id="yui_3_16_0_ym19_1_1469709829338_7568"><div>20 — Scope of procedural provisions</div><div>21 — Search and seizure of stored computer data</div><div>22 — Power to search without a warrant in special circumstances</div><div>23 — Record of and access to seized data</div><div>24 — Production order</div><div>25 — Expedited preservation and partial disclosure of traffic data</div><div>26 — Real-time collection of traffic data</div><div id="yui_3_16_0_ym19_1_1469709829338_7575">27 — Interception of content data</div><div>28 — Obstruction and misuse</div><div>29 — Appeal</div><div id="yui_3_16_0_ym19_1_1469709829338_7567">30 — Confidentiality and limitation of liability</div></div><div style="font-size:12.8px;"><br></div><div style="font-size:12.8px;">You can access the bill here: <a rel="nofollow" target="_blank" href="http://www.mygov.go.ke/?p=11234" style="font-size:12.8px;">http://www.mygov.go.ke/?p=11234</a> or download the attached document.</div><div style="font-size:12.8px;"><br></div><div style="font-size:12.8px;" id="yui_3_16_0_ym19_1_1469709829338_7526"><u id="yui_3_16_0_ym19_1_1469709829338_7525"><b id="yui_3_16_0_ym19_1_1469709829338_7524">The Concerns</b></u></div><div style="font-size:12.8px;" id="yui_3_16_0_ym19_1_1469709829338_7533"><div>1.<span style="font-stretch:normal;font-size:7pt;"> </span> To what extent are the service providers supposed to disclose their client data to the authorities?</div><div></div><div></div><div>2.<span style="font-stretch:normal;font-size:7pt;"> </span>Does any of the search or seizure powers given to authorities in this section violate any privacy rights enshrined in our constitution?</div><div>3. Has this part extensively covered all the investigation procedures required for all the offences stated in part II?</div><div id="yui_3_16_0_ym19_1_1469709829338_7532">4. Does it match the international standards? If it does not, kindly point out areas that need to be incorporated into the bill.</div><div>N/B: Feel free to raise any concern or question not suggested here.</div><div id="yui_3_16_0_ym19_1_1469709829338_7565"><br></div><div>We are looking forward to your feedback on the above concerns and much more.</div><div>Thank you. </div><div></div><div></div><div>Barrack and Karis.</div></div><div><br></div>-- <br><div class="yiv7878604428gmail_signature" id="yui_3_16_0_ym19_1_1469709829338_7546"><div dir="ltr" id="yui_3_16_0_ym19_1_1469709829338_7545"><div id="yui_3_16_0_ym19_1_1469709829338_7544"><div dir="ltr" id="yui_3_16_0_ym19_1_1469709829338_7543"><div id="yui_3_16_0_ym19_1_1469709829338_7542"><div id="yui_3_16_0_ym19_1_1469709829338_7541">Best Regards,<br><br></div></div></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;" id="yui_3_16_0_ym19_1_1469709829338_8078"><div id="yui_3_16_0_ym19_1_1469709829338_8077"><div id="yui_3_16_0_ym19_1_1469709829338_8076"><div id="yui_3_16_0_ym19_1_1469709829338_8075"><div id="yui_3_16_0_ym19_1_1469709829338_8074"><font size="2">Kelvin Kariuki</font></div></div></div></div><div id="yui_3_16_0_ym19_1_1469709829338_8082"><div id="yui_3_16_0_ym19_1_1469709829338_8081"><div id="yui_3_16_0_ym19_1_1469709829338_8080"><div id="yui_3_16_0_ym19_1_1469709829338_8079"><font size="2" id="yui_3_16_0_ym19_1_1469709829338_8090">Twitter Handle: @teacherkaris</font></div></div></div></div><div id="yui_3_16_0_ym19_1_1469709829338_8085"><div id="yui_3_16_0_ym19_1_1469709829338_8084"><div id="yui_3_16_0_ym19_1_1469709829338_8083"><font size="2" id="yui_3_16_0_ym19_1_1469709829338_8089">Alt email: <a rel="nofollow" ymailto="mailto:kkariuki@mmu.ac.ke" target="_blank" href="mailto:kkariuki@mmu.ac.ke" id="yui_3_16_0_ym19_1_1469709829338_8088">kkariuki@mmu.ac.ke</a></font></div></div></div><div id="yui_3_16_0_ym19_1_1469709829338_8087"><div id="yui_3_16_0_ym19_1_1469709829338_8086"><font size="2">Mobile: +2547 29 385 557</font></div></div></blockquote></div></div>
</div></div><br><br></div> </div> </div> </div></div></body></html>