<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:Helvetica;
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Verdana;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:"Comic Sans MS";
panose-1:3 15 7 2 3 3 2 2 2 4;}
@font-face
{font-family:"Trebuchet MS";
panose-1:2 11 6 3 2 2 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle19
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>Good afternoon Listers,<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>Does the Kenyan law give you as a citizen the right to privacy? <o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>Without a right to privacy you cannot expect your data to be private as there is no legal basis.<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>Without the legal pressure to keep your data private most organizations will not invest in data security.<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>Regards,<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span></b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif'> kictanet <kictanet-bounces+awatila=yahoo.co.uk@lists.kictanet.or.ke> <b>On Behalf Of </b>Mariga Wang'ombe via kictanet<br><b>Sent:</b> Wednesday, July 11, 2018 12:18<br><b>To:</b> awatila@yahoo.co.uk<br><b>Cc:</b> Mariga Wang'ombe <marigawangombethoithi@gmail.com><br><b>Subject:</b> Re: [kictanet] Kenya IGF Online Discussions Day 2: Strengthening Data Security in the Context of Emerging Trends<o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p><div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'>Here's a short Twitter thread on basic ways that we give away our information<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#14171A;background:#E6ECF0'><a href="https://twitter.com/alkags/status/1011626368847794177">https://twitter.com/alkags/status/1011626368847794177</a></span><span style='font-family:"Trebuchet MS",sans-serif'><o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'>There are small ways we give away information without even thinking about it e.g when paying via Mpesa at restaurants and they ask to see our confirmation message- the has two problems- one you give away your Mpesa balance but additionally, you give away other Mpesa transactions- the names of people, the numbers and the value of your transactions.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'>Additionally, when we get into buildings and leave them with our ID cards and then give them details including our phone numbers.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'>There are endless ways to harvest data from a population that isn't conscious about it<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Trebuchet MS",sans-serif'><o:p> </o:p></span></p></div></div><div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal>On 11 July 2018 at 09:37, David Indeje via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<o:p></o:p></p><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>Listers,<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>This is an interesting topic now that almost every service we get from the government is being automated to ensure our personal details are captured. <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>For instance, our children are being registered in schools digitally, NTSA, KRA, NHIF/NSSF and so much more.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>It is a fact that data sharing is a way of life now. Credit cards, e-commerce, and online banking all rely on personal data being transmitted to companies via technology.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>Thus, security must become our way of life too. On the other hand, We can’t rely on orgs, companies, and brands to protect our data in the way that we would.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>Therefore, we should: Not give up personal data easily<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'>Ultimately, how policies are crafted, and how much we invest in data security will pay off. For instance, The enactment of the Access to Information Act ensures that information within Government custody is freely available to the public. This will provide opportunities for openness and transparency thus stifling corruption. The public will have the opportunity to peruse public information and hold government accountable.<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Comic Sans MS"'><o:p> </o:p></span></p></div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><p class=MsoNormal><b><span style='font-size:9.5pt;font-family:"Trebuchet MS",sans-serif;color:#990000'>Kind Regards,</span></b><o:p></o:p></p><p style='margin-top:6.0pt'><b><span lang=EN-GB style='font-size:10.0pt;font-family:"Trebuchet MS",sans-serif;color:#990000'>David Indeje </span></b><span style='font-size:9.5pt'><o:p></o:p></span></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:3.75pt;margin-left:0in;line-height:11.25pt'><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#4A4A4A'><img border=0 id="_x0000_i1025" src="https://cytonn.sheerhr.com/signature/icon/ico-phone.png"> +254 (0) 711 385 945| +254 (0) 734 024 856 <img border=0 id="_x0000_i1026" src="https://cytonn.sheerhr.com/signature/icon/ico-web.png"> <a href="http://bit.ly/2eJF9B4" target="_blank">Khusoko</a><o:p></o:p></span></p><p style='mso-margin-top-alt:11.25pt;margin-right:0in;margin-bottom:3.75pt;margin-left:0in;mso-line-height-alt:11.25pt'><a href="https://www.facebook.com/DavidIndeje/" target="_blank"><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#1155CC;text-decoration:none'><img border=0 id="_x0000_i1027" src="https://cytonn.sheerhr.com/signature/icon/facebook-ico.png"></span><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#1155CC'> </span></a><a href="https://twitter.com/David_Indeje" target="_blank"><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#1155CC;text-decoration:none'><img border=0 id="_x0000_i1028" src="https://cytonn.sheerhr.com/signature/icon/twitter-ico.png"></span><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#1155CC'> </span></a><a href="http://ke.linkedin.com/pub/david-indeje/17/7b9/647" target="_blank"><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#1155CC;text-decoration:none'><img border=0 id="_x0000_i1029" src="https://cytonn.sheerhr.com/signature/icon/linkedin-ico.png"></span></a> <span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:#666666'>Skype: david.indeje </span><o:p></o:p></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><p class=MsoNormal><o:p> </o:p></p></div><p class=MsoNormal><o:p> </o:p></p><div><div><p class=MsoNormal>On Wed, 11 Jul 2018 at 08:02, Grace Bomu via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<o:p></o:p></p></div><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>Listers, <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>Thank you to all who contributed to yesterday's topic. The thread is still open for those who may have further thoughts on content regulation. <o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-family:"Verdana",sans-serif'>Welcome to Day 2 of online pre KIGF debates where out topic today is </span><span style='font-size:10.0pt;font-family:"Arial",sans-serif;color:black'>Strengthening Data Security in the Context of Emerging Trends</span><span style='font-family:"Verdana",sans-serif'>. We shall look at cybersecurity in the context of data. <o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-family:"Verdana",sans-serif'>Barely a few weeks ago, social media was awash with memes of Wazir Boniface Chacha, the young man alleged to have conned MPs after getting access to their phone data. Later when this was used as a justification in debates for the Cybercrime Act, some wondered whether the political process had used the Chacha saga to justify the quick passage of a law creating offences. <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>But beyond "small data" in our personal possession, many SMEs , corporations, institutions, societies and other bodies are holding significant amounts of data. <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>In this community, the wider issue of cyber security has been a recurring theme in KIGF. It is generally agreed that the best approach is a multi-pronged one that includes the law, good practices, effective mitigation and response to incidences at multiple levels, creation of awareness and technical solutions among others. Having gotten a new law in the form of the Cybercrimes Act, are we assured of data security? <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>Are our existing mechanisms for mitigation and response to incidences adequate for emerging threats?<o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>Do we have positive cases or good practices to imitate?<o:p></o:p></span></p></div><div><p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-family:"Verdana",sans-serif'>What challenges that remain and how can we address them? <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-family:"Verdana",sans-serif'>Welcome to the discussion. <br clear=all><o:p></o:p></span></p></div><p class=MsoNormal><br>-- <o:p></o:p></p><div><div><div><div><div><div><div><p class=MsoNormal>Grace Mutung'u <br>Skype: gracebomu<br>@Bomu<br><span style='font-size:9.5pt'>PGP ID : 0x33A3450F</span><o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div></div></div></div></div></div></div></div><p class=MsoNormal>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>Twitter: <a href="http://twitter.com/kictanet" target="_blank">http://twitter.com/kictanet</a><br>Facebook: <a href="https://www.facebook.com/KICTANet/" target="_blank">https://www.facebook.com/KICTANet/</a><br>Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" target="_blank">www.eacdirectory.co.ke</a><br><br>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/davidindeje%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/davidindeje%40gmail.com</a><br><br>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br><br>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<o:p></o:p></p></blockquote></div><p class=MsoNormal style='margin-bottom:12.0pt'><br>_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>Twitter: <a href="http://twitter.com/kictanet" target="_blank">http://twitter.com/kictanet</a><br>Facebook: <a href="https://www.facebook.com/KICTANet/" target="_blank">https://www.facebook.com/KICTANet/</a><br>Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" target="_blank">www.eacdirectory.co.ke</a><br><br>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/marigawangombethoithi%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/marigawangombethoithi%40gmail.com</a><br><br>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br><br>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<o:p></o:p></p></blockquote></div><p class=MsoNormal><br><br clear=all><o:p></o:p></p><div><p class=MsoNormal><o:p> </o:p></p></div><p class=MsoNormal>-- <o:p></o:p></p><div><div><div><div><div><div><div><div><p class=MsoNormal><b><span style='font-family:"Trebuchet MS",sans-serif'>Kind Regards,</span></b><o:p></o:p></p><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal><b><span style='font-family:"Trebuchet MS",sans-serif'>Mariga Wang'ombe wa Thoithi</span></b><o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal><b><span style='font-family:"Trebuchet MS",sans-serif'>+254 721 629 658/ +254 731 053 816</span></b><o:p></o:p></p></div></div></div></div></div></div></div></div></div></div></div></body></html>