<div dir="ltr"><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4"><span style="line-height:115%;font-family:tahoma,sans-serif;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">The
<b>current Data Protection Bill 2013 section
17 (b)</b> waters down the provisions regarding misuse of information in
section 16 by allowing use of personal data for commercial purposes without
obtaining consent as long as it is allowed by<span class="gmail-apple-converted-space"> </span></span><strong><span style="font-family:tahoma,sans-serif">any other law</span></strong>. This
clause provides a loophole that can be exploited to evade the principles
provided for in section 4. Furthermore, <b>t</b><b>here is
no provision prohibiting supply and sale of i.e electoral registers,
registration of persons records</b> for political and commercial purposes
having regard to the nature of the data contained in the registers, including
in particular that it is personal data compulsorily obtained for the specific
purpose of enabling Kenyans transact and qualifying electors to vote.<span style="line-height:115%;font-family:tahoma,sans-serif"><span></span></span></font></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="line-height:115%;font-family:tahoma,sans-serif"><span><font size="4"> </font></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify"><span style="line-height:115%;font-family:tahoma,sans-serif"><span><font size="4"> </font></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4"><span style="line-height:115%;font-family:tahoma,sans-serif;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">The current Data Protection
Bill 2013 offers no solid protection to the data subject and doesn’t
reflect the current best practices globally. With the current Bill, data
subjects remain at the mercy of the data processors and controllers (agencies)
as the legal burden/responsibility the act imposes on the authorized users is
not sufficient .</span> </font></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4"><br></font></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4">There is an urgent need to revise the current draft to address some of these
issues that we are currently experiencing. <span></span></font></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="line-height:115%;font-family:tahoma,sans-serif;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4"><br></font></span></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="line-height:115%;font-family:tahoma,sans-serif;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4">Further reference: <a href="https://wbilaw.wordpress.com/2016/07/30/data-protection-bill-kenya-analysis/">https://wbilaw.wordpress.com/2016/07/30/data-protection-bill-kenya-analysis/</a><span></span></font></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="line-height:115%;font-family:tahoma,sans-serif;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span><font size="4"> </font></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><font size="4"><span style="font-family:tahoma,sans-serif">Regards,</span><span style="font-family:arial,sans-serif"><span></span></span></font></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-family:arial,sans-serif"><span><font size="4"> </font></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-family:tahoma,sans-serif"><font size="4">Esther
Kamande </font></span><span style="font-size:12pt;font-family:arial,sans-serif"><span></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-size:12pt;font-family:tahoma,sans-serif">Advocate |
Policy Analyst</span><span style="font-size:12pt;font-family:arial,sans-serif"><span></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-size:12pt;font-family:arial,sans-serif"><span> </span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-size:12pt;font-family:tahoma,sans-serif">Twitter:
@enkamande<span></span></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span> </span></p></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div><br></div><div><i><font color="#ff00ff"><br></font></i></div><div><p style="font-size:12.8px;text-align:justify"><font face="tahoma, sans-serif">Regards,</font></p><p style="font-size:12.8px;text-align:justify"><span style="font-family:tahoma,sans-serif;font-size:12.8px">Esther Kamande </span><br></p><p style="font-size:12.8px;text-align:justify"><font face="tahoma, sans-serif">Advocate | Policy Analyst</font></p><p style="text-align:justify"><span style="font-family:tahoma,sans-serif;font-size:12.8px">Twitter: @enkamande</span><br></p></div><div><font face="tahoma, sans-serif"><br></font></div><div><br><br></div></div></div></div></div></div></div></div></div>
<br><div class="gmail_quote">On Sat, Feb 4, 2017 at 7:05 PM, Mose Karanja via kictanet <span dir="ltr"><<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word"><div>A pattern is very evident since late last year on database breaches for political ends. </div><div>------</div>"It appears that all ID numbers from perceived Jubilee strongholds have
been run through the IEBC voters register to find out their registration
status. The chiefs have been issued with sheets of papers containing
mobile numbers of all residents within their locations and sub locations
who are not registered. <div>…</div><div><br></div><div>“We got this data from the registrar of persons and the brief to the
chiefs was to ascertain whether these people are registered. I don’t see
anything wrong with that. We are not coercing anybody to register,”
Sosio said. He added: “I don’t know whether the same is taking place in
other counties but as you know, homes are run differently and this is
how we have chosen to do it in Nyeri.”</div><div>-------</div><div>Read more:</div><div> </div><div><div><a href="https://www.standardmedia.co.ke/mobile/article/2001228175/revealed-inside-jubilee-s-vote-machine-to-beat-raila-odinga" target="_blank">https://www.standardmedia.co.<wbr>ke/mobile/article/2001228175/<wbr>revealed-inside-jubilee-s-<wbr>vote-machine-to-beat-raila-<wbr>odinga</a></div><div> <br><div>
<div style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word"><div style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word"><div style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word"><div><font face="arial" size="1"><span style="background-color:rgb(255,255,255)">---</span></font></div><div><font face="arial" size="1"><span style="background-color:rgb(255,255,255)">Moses Karanja</span></font></div><div><font face="arial" size="1"><span style="background-color:rgb(255,255,255)"><a href="http://www.moseskaranja.com/blog" target="_blank">www.moseskaranja.com/blog</a> </span></font><span style="color:rgb(34,34,34);font-family:'trebuchet ms',sans-serif;font-size:x-small;letter-spacing:0.28px;line-height:34px;white-space:pre-wrap;background-color:rgb(255,255,255)"></span></div><div><br></div></div><br class="m_-7614456719162753758Apple-interchange-newline"></div><br class="m_-7614456719162753758Apple-interchange-newline"></div><br class="m_-7614456719162753758Apple-interchange-newline"><br class="m_-7614456719162753758Apple-interchange-newline">
</div>
<br></div></div></div><br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/<wbr>KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/enkamande%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/options/kictanet/<wbr>enkamande%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div><br></div>