<div dir="ltr"><div>Hi listers,</div><div><font face="verdana, sans-serif"><br></font></div><font face="verdana, sans-serif">Amazing insights being shared so far and one can only be grateful. </font><div>
<div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">Are our existing mechanisms for mitigation and response to incidences adequate for emerging threats?<br></div><div class="gmail_default" style="background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial"><font face="verdana, sans-serif">At the moment the mechanisms cannot be stated to be adequate, if anything, we are vulnerable more than ever without the proverbial 'Data Protection Legislation' to profiling and all other forms of proliferation of personal data. The extent of this proliferation cannot be understated as was seen in the link below. </font><br><font face="verdana, sans-serif"><a href="http://kenyalaw.org/caselaw/cases/view/151117/">http://kenyalaw.org/caselaw/cases/view/151117/</a></font></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">The Computer Misuse and CyberCrimes Bill is majorly unconstitutional and the Political agenda in enacting it was quite distinct.</div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif"><br></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">Do we have positive cases or good practices to imitate?<br></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">Since we cannot rely on the Soft Infrastructure that has been cited, data minimalism is an effective initiative we can undertake as a means of individual security measures. Kind of taking the law into your own hands only now you'd be taking your data into your own hands.</div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">Data minimalism is however moot without sufficient sensitization from the earliest age possible on the need to limit the amount of personal data divulged online.</div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">So to achieve adequate data security in the existing cyberspace, outreach and sensitization programmes on the need for data minimalism would best fit tackling the challenges to personal data security.</div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif"><br></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">What challenges that remain and how can we address them?<span> </span></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif">Again sensitization on Privacy and what Data one provides while scrolling, liking, commenting and generally using social media platforms would go a long way. The implications of filling online forms and/or linking third party users to online accounts that store our personal data are vast and unprecedented in a negative way. Access to the internet grows faster and deeper by the day and little or no consumer education is provided on the dynamics of accessing it such as Data.</div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif"><span>
<span style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;float:none;display:inline">We can do better, ought to do better to ensure we thrive in a data driven economy.</span></span></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif"><span><span style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;float:none;display:inline"><br></span></span></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif"><span><span style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;float:none;display:inline">Kind Regards,</span></span></div><div class="gmail_default" style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;font-family:verdana,sans-serif"><span><span style="font-size:small;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;float:none;display:inline">William (</span></span>LL.B) </div>
<br></div></div><br><div class="gmail_quote"><div dir="ltr">On Wed, Jul 11, 2018 at 8:00 AM Grace Bomu via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div class="gmail_default" style="font-family:verdana,sans-serif">Listers, <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Thank you to all who contributed to yesterday's topic. The thread is still open for those who may have further thoughts on content regulation. <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Welcome to Day 2 of online pre KIGF debates where out topic today is <span style="font-size:10pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-variant-alternates:normal;font-variant-east-asian:normal;font-variant-numeric:normal;text-decoration:none;vertical-align:baseline;white-space:pre-wrap" id="m_3885909803492352209m_-4873884615919934799gmail-docs-internal-guid-81d99bd5-84e3-3e7c-252f-95072211e687">Strengthening Data Security in the Context of Emerging Trends</span>. We shall look at cybersecurity in the context of data. <br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Barely a few weeks ago, social media was awash with memes of Wazir Boniface Chacha, the young man alleged to have conned MPs after getting access to their phone data. Later when this was used as a justification in debates for the Cybercrime Act, some wondered whether the political process had used the Chacha saga to justify the quick passage of a law creating offences. <br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">But beyond "small data" in our personal possession, many SMEs , corporations, institutions, societies and other bodies are holding significant amounts of data. <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">In this community, the wider issue of cyber security has been a recurring theme in KIGF. It is generally agreed that the best approach is a multi-pronged one that includes the law, good practices, effective mitigation and response to incidences at multiple levels, creation of awareness and technical solutions among others. Having gotten a new law in the form of the Cybercrimes Act, are we assured of data security? <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Are our existing mechanisms for mitigation and response to incidences adequate for emerging threats?<br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Do we have positive cases or good practices to imitate?<br></div><div class="gmail_default" style="font-family:verdana,sans-serif">What challenges that remain and how can we address them? <br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Welcome to the discussion. <br clear="all"></div><br>-- <br><div class="m_3885909803492352209m_-4873884615919934799gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Grace Mutung'u <br>Skype: gracebomu<br>@Bomu<br><span style="font-size:12.8px">PGP ID : 0x33A3450F</span><br></div><div><br></div></div></div></div></div></div></div>
</div>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" rel="noreferrer" target="_blank">www.eacdirectory.co.ke</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/willbill.mathenge%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/willbill.mathenge%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div>