<html><head></head><body><div style="color:#000; background-color:#fff; font-family:garamond, new york, times, serif;font-size:16px"><div id="yui_3_16_0_ym19_1_1518169225826_139059"><br></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><span style="font-size: x-large;" id="yui_3_16_0_ym19_1_1518169225826_141775">Would be of interest to share-in the national and Africa regional data. This piece would underscore the critical role of the Business community i.e users.</span></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><span style="font-size: x-large;"><br></span></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><span style="font-size: x-large;" id="yui_3_16_0_ym19_1_1518169225826_142819">Also the need to grow the talent and skill set to support the bill - proactively versus reactive (including its policing).</span></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><span style="font-size: x-large;"><br></span></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><span style="font-size: x-large;" id="yui_3_16_0_ym19_1_1518169225826_144025">It also links academia and government especially in promoting research and proactive know-how.</span></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><span style="font-size: x-large;"><br></span></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><br></div><div id="yui_3_16_0_ym19_1_1518169225826_139059"><br></div><div id="yui_3_16_0_ym19_1_1518169225826_139059" dir="ltr"><a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf" id="yui_3_16_0_ym19_1_1518169225826_141546">https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf</a></div><div></div><div id="yui_3_16_0_ym19_1_1518169225826_138629"><br></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><span style="" id="yui_3_16_0_ym19_1_1518169225826_138662">"</span><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;" id="yui_3_16_0_ym19_1_1518169225826_138788">As the UK government’s </span><a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf" target="_blank" style="box-sizing: border-box; color: rgb(41, 141, 195); background-color: rgb(255, 255, 255); text-decoration-line: none; font-family: SegoeRegular; font-size: 18px;" id="yui_3_16_0_ym19_1_1518169225826_138663">Cyber Security Breaches Survey 2017</a><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;" id="yui_3_16_0_ym19_1_1518169225826_138664"> noted: “overall, businesses that hold electronic personal data on customers are more likely than average to have had breaches (51% versus 46%). Nonetheless, breaches are still prevalent among organisations whose senior managers consider cyber security a low priority (35%), and in firms where online services are not at all seen as core to the business (41%).”..."</span></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;"><br></span></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;"><br></span></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;">Be blessed.</span></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;"><br></span></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><span style="color: rgb(48, 48, 48); font-family: SegoeRegular; font-size: 18px;">Regards/Wangari</span></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><font color="#303030" face="SegoeRegular"><span style="font-size: 18px;"><br></span></font></div><div class="signature" id="yui_3_16_0_ym19_1_1518169225826_138631" dir="ltr"><font color="#303030" face="SegoeRegular"><span style="font-size: 18px;"><b>---</b></span></font><font style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2"><span style="color:rgb(127, 0, 63);">Pray God Bless. 2013Wangari circa - </span><span style="color:rgb(127, 0, 63);">"Being of the Light, We are Restored Through Faith in Mind, Body and Spirit; We Manifest The Kingdom of God on Earth".</span></font><br></div> <div class="qtdSeparateBR"><br><br></div><div class="yahoo_quoted" id="yui_3_16_0_ym19_1_1518169225826_141508" style="display: block;"> <div style="font-family: garamond, new york, times, serif; font-size: 16px;" id="yui_3_16_0_ym19_1_1518169225826_141507"> <div style="font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, Sans-Serif; font-size: 16px;" id="yui_3_16_0_ym19_1_1518169225826_141506"> <div dir="ltr"><font size="2" face="Arial"> On Friday, 9 February 2018, 16:45, WANGARI KABIRU via kictanet <kictanet@lists.kictanet.or.ke> wrote:<br></font></div> <br><br> <div class="y_msg_container" id="yui_3_16_0_ym19_1_1518169225826_141505"><div id="yiv9405305051"><div id="yui_3_16_0_ym19_1_1518169225826_141504"><div style="color:#000;background-color:#fff;font-family:garamond, new york, times, serif;font-size:16px;" id="yui_3_16_0_ym19_1_1518169225826_141503"><div id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41088"><span></span></div><div></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40514"><font size="5"><b>Comments</b><br clear="none"></font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40596"><ol id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40997"><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40998"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42563" size="5">International Cooperation; Extradition? Protection (point of "disprotection") of Kenyan nationals? Foreign nationals? - How this is covered.<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42562"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42561" size="5">The Listed New Clause; Proposes Cabinet Secretary responsible for Internal Security develops SOPS. Thus in establishment of National Cybersecurity Council, presumably a very high stakes national agency now that intelligent crime has lifted to the cyber, s/he should sit in, not just their representative.<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41087"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42836" size="5">Suited Domicile; National Cybersecurity Council; The agency is a good recommendation. What are the chances that such an agency would be under MOITC? DG CA to be the Secretary? Feeding Into; Hii ni kama security council. I expect that cybesecurity should be the breakfast for a digital age President and teams. Good practices elsewhere may also enlighten; on its roles, purposes which would help guide on this.<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41399"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41398" size="5">http://www.klrc.go.ke/index.php/constitution-of-kenya/155-chapter-fourteen-national-security/part-1-national-security-organs/409-240-establishment-of-the-national-security-council<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42851"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42850" size="5">Name; Consider National Cybersecurity Advisory Council - which feeds into the national security council. Then under MOITC, DG CA etc. And can have many people with different hats.<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40996"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42927" size="5">National Cybersecurity Council; Inclusion of Devolution Ministry - The existing governance system is through counties - the counties stand as point of vulnerablity and require to be in the light and accountability.<br clear="none"></font></li><li><font size="5">National Cybersecurity Council; It would be hard to escape from Financial Services Representative - this is the greatest area that pinches or is<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42524"><font size="5"> National Cybersecurity Council; Business Association - these people need to be in the loop<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41089"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42521" size="5">National Cybersecuirty Council; "n" and 'r" - "r" has associations for determination of place to choose from or they use "n"?<br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41089"><font size="5">When TOR is developed, to include sharing of quarterly national cybersecurity report; a people informed may be better able to enhance their and in turn make us more cyber secure.</font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41316"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41315" size="5"><That said on the Council, it appears to be very big - trying to fit in many hats. And yes, Forensics is missing><br clear="none"></font></li><li id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41312"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41311" size="5">Effect of GDPR; Europe's direction, few nation will not be impacted or follow suit - from fines intensity to giving the data power back to the consumers.</font></li><li><font size="5">Finally; After all the law has said all it may, Mwananchi on being breached should be "compensatable". <br clear="none"></font></li></ol></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40608"><font size="5"><br clear="none" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40609"></font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40610"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41228" size="5">That said, on the business front, our corporations and we all are in trouble, not because they should be but because the environment might be complacent now. This aspect requires to be a top topical matter on each CEOs crisis boardroom.</font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40610"><font size="5"><br clear="none"></font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40611"><font size="5">A good GDPR piece below to close with.</font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40612"><font size="5"><br clear="none" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40613"></font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40614"><font id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42482" size="5">Thank you for the guiding summary.</font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40615"><font size="5"><br clear="none" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40616"></font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40617"><font size="5">Be blessed.</font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40618"><font size="5">Regards/Wangari</font></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40619"><br clear="none" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40620"></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40621">=============</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40622"><br clear="none" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40623"></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40624"><a rel="nofollow" shape="rect" class="yiv9405305051enhancr2_ef2a7f57-4187-c955-2b86-f834a65b40af" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_41071" target="_blank" href="http://www.mobilenewscwp.co.uk/2018/01/31/gdpr-biggest-change-20-years-no-reason-panic/">‘GDPR is the biggest change in 20 years but no reason to panic’ - Mobile News Online</a></div><div><br clear="none"></div><div class="yiv9405305051yahoo-link-enhancr-card yiv9405305051ymail-preserve-class yiv9405305051ymail-preserve-style" dir="ltr" id="yiv9405305051enhancr2_ef2a7f57-4187-c955-2b86-f834a65b40af" style="max-width:400px;font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;" data-url="http://www.mobilenewscwp.co.uk/2018/01/31/gdpr-biggest-change-20-years-no-reason-panic/" data-type="yenhancr" data-category="article" data-embed-url="" data-size="medium"> <a rel="nofollow" shape="rect" class="yiv9405305051yahoo-enhancr-cardlink" target="_blank" href="http://www.mobilenewscwp.co.uk/2018/01/31/gdpr-biggest-change-20-years-no-reason-panic/" style="text-decoration:none;color:#000;"> <table class="yiv9405305051card-wrapper yiv9405305051yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" style="max-width:400px;"><tbody><tr><td colspan="1" rowspan="1" width="400"> <table class="yiv9405305051card yiv9405305051yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" width="100%" style="max-width:400px;"><tbody><tr><td colspan="1" rowspan="1" valign="top" class="yiv9405305051card-primary-image-cell" style="background:#000 url('https://s.yimg.com/vv//api/res/1.2/DkEZFfwCjsXpSXPXVGwbRw--~A/YXBwaWQ9bWFpbDtmaT1maWxsO2g9MjAwO3c9NDAw/http://www.mobilenewscwp.co.uk/wp-content/uploads/2018/01/GDPR-web-image.jpg.cf.jpg') no-repeat center center;background-size:cover;min-height:200px;position:relative;" background="https://s.yimg.com/vv//api/res/1.2/DkEZFfwCjsXpSXPXVGwbRw--~A/YXBwaWQ9bWFpbDtmaT1maWxsO2g9MjAwO3c9NDAw/http://www.mobilenewscwp.co.uk/wp-content/uploads/2018/01/GDPR-web-image.jpg.cf.jpg" bgcolor="#000000"> <table class="yiv9405305051yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" style="width:100%;"><tbody><tr><td colspan="1" rowspan="1" valign="top" style="background:transparent url('https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png') repeat left top;min-height:200px;" background="https://s.yimg.com/nq/storm/assets/enhancrV2/12/overlay-tile.png" bgcolor="transparent"> <table class="yiv9405305051yahoo-ignore-table" height="185" style="width:100%;min-height:185px;min-height:185px;"><tbody><tr><td colspan="1" rowspan="1" class="yiv9405305051card-richInfo2" style="text-align:left;text-align:left;padding:15px 0 0 15px;vertical-align:top;"> </td><td colspan="1" rowspan="1" class="yiv9405305051card-actions" style="text-align:right;padding:15px 15px 0 0;vertical-align:top;"> <div class="yiv9405305051card-share-container"></div> </td></tr></tbody></table> </td></tr></tbody></table> </td></tr><tr><td colspan="1" rowspan="1"> <table align="center" class="yiv9405305051card-info yiv9405305051yahoo-ignore-table" cellpadding="0" cellspacing="0" border="0" style="background:#fff;position:relative;z-index:2;width:95%;max-width:380px;border:1px solid #e0e4e9;border-bottom:3px solid #000000;margin-top:-40px;margin-left:auto;margin-right:auto;"><tbody><tr><td colspan="1" rowspan="1" style="background-color:#ffffff;padding:16px 0 16px 12px;vertical-align:top;"> </td><td colspan="1" rowspan="1" style="vertical-align:middle;padding:16px 12px;width:99%;"> <h2 class="yiv9405305051card-title" style="font-size:16px;line-height:19px;margin:0 0 4px 0;font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;">‘GDPR is the biggest change in 20 years but no reason to panic’ - Mobile Ne...</h2> <div class="yiv9405305051card-richinfo-primary" style="font-size:11px;line-height:15px;color:#999;">By Elliot Mulley-Goodbarne</div> <div class="yiv9405305051card-description" style="font-size:11px;line-height:15px;color:#999;">Exploring the fact and fiction behind the upcoming General Data Protection Regulation Data. The industry buzzwor...</div> </td><td colspan="1" rowspan="1" style="text-align:right;padding:16px 12px 16px 0;"> </td></tr></tbody></table> </td></tr></tbody></table> </td></tr></tbody></table> </a></div><div><br clear="none"></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40624"><br clear="none"></div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40625">Exploring the fact and fiction behind the upcoming General Data Protection Regulation</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40626">"Data. The industry buzzword. From surfing the internet on your phone to the bank details on your computer, the term seems to traverse every conversation in relation to technology.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40627">It’s a word you’re likely to read, hear and probably say a lot more over the next 12 months as the General Data Protection Regulation (GDPR) from the European Union comes into force on May 25. Businesses across Europe will need to take a stricter view to protecting the information they hold.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40628">The primary purpose of the regulation is to strengthen and unify data protection for all European Union citizens, giving them back control of personal data.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40629">As well as data protection, the impending regulations also give the subject of that information the power to see the details a company holds and the right to be forgotten when that information is no longer necessary.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40630">With an update in rules there is a change in the financial implications of breaking them, which will grow from £500,000 to €20 m (£17.6 m) or four per cent of annual global turnover, whichever is greater."</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40631">"Increased Control </div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40632">One of the larger points for GDPR is the increased control that will be given to the subject of the information that businesses hold.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40633">As part of the new regulations, companies are required to be more transparent with customers as to what data it holds on a person, with that person also being afforded the right to be forgotten and the right to portability; in short, subjects will be able to find out what data a business has, and have it erased if the information is not needed.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40634">However, placing control of data in the hands of the consumer also has the potential to drain company resources as millions of customers will soon have the right to have a request answered within a month.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40635">Research from Exonar also pointed out that more than 9.5 million mobile subscribers in the UK will be making subject access requests (SAR) to their network provider once GDPR goes live in four months’ time."</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40636">"Thinking Twice</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40637">According to Seward, the onus on compliance and to protect data has always been on the possesser of the information, however, the changes that will come into affect from GDPR will make companies think twice about their security policies.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40638">“This is placing more and more emphasis on the possessors as more and more data is captured around customers.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40639">“Things like credit card details, address details, credit files or transactional details is all data that needs to be kept secure.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40640">Parker said: “We are all familiar with these pre-populated tick boxes people use when they are doing online shopping which means you get hit with a lot of marketing as a consequence.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40641">“Those days are categorically over, individuals will now have to explicitly give consent for people to use personal information.”</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40642">Evans also stressed the importance of knowing what information companies can hold and added that some may be caught out by the new regulations.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40643">She said: “Companies need to understand the information that you’ve got and what the risk is in holding it, making sure that, where they are holding personal information, they have the legal right to do so.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40644">“There are some big headlines that come under GDPR. I think most organisations are addressing them well but obviously it is worth thinking about.”</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40645">Along with the change in how businesses can gather consent, any consent previously given may also need to be sought again if it was not given in a way that will comply with the impending regulations."</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40646">"Opportunity</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40647">But all is not lost with this new regulation. Seward says there is evidence that GDPR has opened a huge opportunity for businesses to capitalise on non-compliance. He added: “GDPR compliance definitely has been a pull for the past two years.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40648">“People have been saying that this is coming and you need to be compliant or you need to put in place the necessary steps to protect your data and I think it’s probably now that people are waking up and realising that in May they will need to do something about this.</div><div dir="ltr" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_40649">“You’ll probably find that bigger organisations such as banks and financial services have been doing this for a long time. Small businesses probably haven’t thought about this but it is something that they need to switch on to and look at.”..."</div><div class="yiv9405305051signature">---<br clear="none"><font style="font-weight:bold;font-family:verdana, helvetica, sans-serif;" size="2"><span style="color:rgb(127, 0, 63);">Pray God Bless. 2013Wangari circa - </span><span style="color:rgb(127, 0, 63);">"Being of the Light, We are Restored Through Faith in Mind, Body and Spirit; We Manifest The Kingdom of God on Earth".</span></font><br clear="none"></div> <div class="yiv9405305051qtdSeparateBR"><br clear="none"><br clear="none"></div><div class="yiv9405305051yahoo_quoted" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42446" style="display:block;"> <div id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42445" style="font-family:garamond, new york, times, serif;font-size:16px;"> <div id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42444" style="font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, Sans-Serif;font-size:16px;"> <div class="yiv9405305051yqt9733370127" id="yiv9405305051yqtfd43178"><div dir="ltr"><font size="2" face="Arial"> On Friday, 9 February 2018, 11:56, Julius Njiraini via kictanet <kictanet@lists.kictanet.or.ke> wrote:<br clear="none"></font></div> <br clear="none"><br clear="none"> <div class="yiv9405305051y_msg_container" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42443"><div id="yiv9405305051"><div id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42442"><div dir="ltr"><div><div><div>Dear Victor<br clear="none"></div>allow me to comment on the above subject,<br clear="none"></div>i would wish to observe the following amendment<br clear="none"><ol><li>On national cyber security, we add </li></ol><ul><li>Representative of organization dealing with private digital forensics investigation services.These will helps in linking with other forensics categories in case of multiple evidence identification links. <br clear="none"></li><li>Representative of organization dealing with accounting profession. These will helps in digital records accounting investigation as technical financial audit.</li></ul>2. on functions of cyber crime, i propose we add <br clear="none"></div>to develop,register and regulate cyber crime professionals<br clear="none"></div><div class="yiv9405305051gmail_extra" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_42441"><br clear="none"><div class="yiv9405305051gmail_quote" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_43002">On Wed, Feb 7, 2018 at 10:38 PM, Victor Kapiyo via kictanet <span dir="ltr"><<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>></span> wrote:<br clear="none"><blockquote class="yiv9405305051gmail_quote" id="yiv9405305051yui_3_16_0_ym19_1_1518169225826_43001" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;"><div class="yiv9405305051yqt9796374450" id="yiv9405305051yqt36801"><div><div>Dear Listers,<div><br clear="none"></div><div>As GG has mentioned, kindly find attached the consolidated points on the bill. Kindly review and make additional suggestions on the proposals. </div><div><br clear="none"></div><div>Looking forward to your feedback.</div><div><br clear="none"></div><div>Good day.</div><div><br clear="none"></div><div><br clear="none"></div><br clear="none"><div class="yiv9405305051gmail_extra"><br clear="none"><div class="yiv9405305051gmail_quote"><div><div class="yiv9405305051h5">On 8 Feb 2018 09:06, "Grace Githaiga via kictanet" <<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a> > wrote:<br clear="none"></div></div><blockquote class="yiv9405305051m_-7789302708630124857quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;"><div><div class="yiv9405305051h5">
<div>Good morning Listers.<br clear="none"><br clear="none">As you are aware, bunge's Departmental Committee on Communications, Information and Innovations has called for comments on the Computer and Cybercrimes bill 2017. The comments have to be submitted by Tuesday, February 13, 2018.<br clear="none"><br clear="none">KICTANet's working group on cybersecurity has been working on this proposed bill and already identified some areas considered needing attention. And due to time constraint, Victor Kapiyo will share it shortly. The idea is to improve the submission to include aspects of CIRTs for counties and any additional changes that may have resulted since the bill was released. <br clear="none"><br clear="none">Victor, over to you on how we proceed. <br clear="none">
<br clear="none">
<br clear="none">
<br clear="none">
Best regards<br clear="none">
<br clear="none">
<br clear="none">
Githaiga, Grace<br clear="none">
<br clear="none"><br clear="none"><div id="yiv9405305051m_-7789302708630124857m_-2511092486311877282EmailSignature">Co-Convenor<br clear="none">
Kenya ICT Action Network (KICTANet)<br clear="none">
Twitter:@ggithaiga<br clear="none">
Tel: 254722701495<br clear="none">
Skype: gracegithaiga<br clear="none">
Alternate email: <a rel="nofollow" shape="rect" class="yiv9405305051m_-7789302708630124857m_-2511092486311877282normal-link" ymailto="mailto:ggithaiga@hotmail.com" target="_blank" href="mailto:ggithaiga@hotmail.com">ggithaiga@hotmail.com</a><br clear="none">
Linkedin: <a rel="nofollow" shape="rect" class="yiv9405305051m_-7789302708630124857m_-2511092486311877282normal-link" target="_blank" href="https://www.linkedin.com/in/gracegithaiga">https://www.linkedin.com/in/gr acegithaiga</a><br clear="none">
<a rel="nofollow" shape="rect" target="_blank" href="http://www.kictanet.or.ke/">www.kictanet.or.ke</a><br clear="none">
<br clear="none">
"Change only happens when ordinary people get involved, get engaged and come together to demand it. I am asking you to believe. Not in my ability to bring about change – but in yours"---Barrack Obama.</div><br clear="none"></div>
<br clear="none"></div></div>______________________________ _________________<br clear="none">
kictanet mailing list<br clear="none">
<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br clear="none">
<a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/m ailman/listinfo/kictanet</a><br clear="none">
Twitter: <a rel="nofollow" shape="rect" target="_blank" href="http://twitter.com/kictanet">http://twitter.com/kictanet</a><br clear="none">
Facebook: <a rel="nofollow" shape="rect" target="_blank" href="https://www.facebook.com/KICTANet/">https://www.facebook.com/KICTA Net/</a><br clear="none">
<br clear="none">
Unsubscribe or change your options at <a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/options/kictanet/vkapiyo%40gmail.com">https://lists.kictanet.or.ke/m ailman/options/kictanet/vkapiy o%40gmail.com</a><br clear="none">
<br clear="none">
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none">
<br clear="none">
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br clear="none">
<br clear="none"></blockquote></div><br clear="none"></div></div></div></div>
<br clear="none">______________________________ _________________<br clear="none">
kictanet mailing list<br clear="none">
<a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br clear="none">
<a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/ mailman/listinfo/kictanet</a><br clear="none">
Twitter: <a rel="nofollow" shape="rect" target="_blank" href="http://twitter.com/kictanet">http://twitter.com/kictanet</a><br clear="none">
Facebook: <a rel="nofollow" shape="rect" target="_blank" href="https://www.facebook.com/KICTANet/">https://www.facebook.com/ KICTANet/</a><br clear="none">
<br clear="none">
Unsubscribe or change your options at <a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/options/kictanet/njiraini2001%40gmail.com">https://lists.kictanet.or.ke/ mailman/options/kictanet/ njiraini2001%40gmail.com</a><br clear="none">
<br clear="none">
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none">
<br clear="none">
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br clear="none">
<br clear="none"></blockquote></div><br clear="none"></div></div></div><div class="yiv9405305051yqt9796374450" id="yiv9405305051yqt01323">_______________________________________________<br clear="none">kictanet mailing list<br clear="none"><a rel="nofollow" shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" target="_blank" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br clear="none"><a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br clear="none">Twitter: <a rel="nofollow" shape="rect" target="_blank" href="http://twitter.com/kictanet">http://twitter.com/kictanet</a><br clear="none">Facebook: <a rel="nofollow" shape="rect" target="_blank" href="https://www.facebook.com/KICTANet/">https://www.facebook.com/KICTANet/</a><br clear="none"><br clear="none">Unsubscribe or change your options at <a rel="nofollow" shape="rect" target="_blank" href="https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk">https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk</a><br clear="none"><br clear="none">The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none"><br clear="none">KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br clear="none"></div><br clear="none"><br clear="none"></div> </div></div><div class="yiv9405305051yqt9733370127" id="yiv9405305051yqtfd31835"> </div></div><div class="yiv9405305051yqt9733370127" id="yiv9405305051yqtfd23819"> </div></div></div></div></div><div class="yqt9733370127" id="yqtfd93488">_______________________________________________<br clear="none">kictanet mailing list<br clear="none"><a shape="rect" ymailto="mailto:kictanet@lists.kictanet.or.ke" href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br clear="none"><a shape="rect" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br clear="none">Twitter: <a shape="rect" href="http://twitter.com/kictanet" target="_blank">http://twitter.com/kictanet</a><br clear="none">Facebook: <a shape="rect" href="https://www.facebook.com/KICTANet/" target="_blank">https://www.facebook.com/KICTANet/</a><br clear="none"><br clear="none">Unsubscribe or change your options at <a shape="rect" href="https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk</a><br clear="none"><br clear="none">The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none"><br clear="none">KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br clear="none"></div><br><br></div> </div> </div> </div></div></body></html>