<div dir="auto">Thank you Grace - I agree! <div dir="auto">Also interesting was the fact that he was from a local university.</div></div><br><div class="gmail_quote"><div dir="ltr">On Wed, Jul 11, 2018, 21:43 Grace Bomu <<a href="mailto:nmutungu@gmail.com">nmutungu@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">This is interesting. We have been conditioned to believe that more and more data is needed from us to usher us into the brave new world. And the use of good old maths to solve shiny new computing problems- We would be interested to hear more.... Thank you for this perspective <div><br>Il mercoledì 11 luglio 2018, John Paul Karijo <<a href="mailto:johnpaulem@gmail.com" target="_blank" rel="noreferrer">johnpaulem@gmail.com</a>> ha scritto:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">I was in a multidisciplinary conference a few weeks ago and this presenter was working on a mathematical formula that would allow us to measure the optimum level at which to give up privacy in order for meaningful use to be viable on the data that is accessed.<div><br></div><div>A kind of a sweet spot where the data collected from users is sufficient for analysis, for computation, for analytics... enough for A.I and ubiquitous computing and yet not to the level where it is personally identifiable or can be used for unwarranted or unsolicited or harmful targeting.</div><div><br></div><div>He is still working on this - I will go look up his name and share later tomorrow.</div><div><br></div><div>He said something interesting though - that coders didn't know how to do this Math...and didn't consult mathematicians (speaking of needing each other)<br><br>My reservations though is that even if this did come to fruition in the long run it would become similar to other mathematical formulae such as the one used to calculate speed limits on roads... which totally doesn't make sense in this era... but which we still apply religiously.</div><div><br clear="all"><div><div dir="ltr" data-smartmail="gmail_signature"><div dir="ltr"><div>With kind regards</div><div><br></div><div><br></div><div>Jeipea</div><div><br></div><div>Believe in yourself then you can change your world</div><div><br></div><div>____________________________________________</div><div>Skype: john.paul.em</div><div>Cell: +254735586956</div></div></div></div><br></div></div><br><div class="gmail_quote"><div dir="ltr">On Wed, Jul 11, 2018 at 9:21 PM Grace Bomu via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank" rel="noreferrer">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">@ Machuhi, Wahengas may need to be recalled to modify 'hakuna siri ya watu wawili' to the smartphone era.<br><br>Il mercoledì 11 luglio 2018, Grace Bomu <<a href="mailto:nmutungu@gmail.com" target="_blank" rel="noreferrer">nmutungu@gmail.com</a>> ha scritto:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">@John, while it is important to understand these distinctions, we should also be alive to the pervasiveness of data harvesting in every aspect of our lives. We ought therefore to see stakeholders beyond the traditional players such as techies, law enforcement and government. <div>@Muraya, Collins, thank you for the reality check examples.I n last year's KIGF, a big debate during the fireside chat was whether privavcy is dead? The call to engage with the Data Protection Bill may be a first step in ensuring that those who collect data protect it. We shall heed it @Mercy. </div><div><br></div><div><br>Il mercoledì 11 luglio 2018, K Machuhi via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank" rel="noreferrer">kictanet@lists.kictanet.or.ke</a>> ha scritto:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><div>Haha.. Muraya's 'steal' deserves its own thread. privacy is what you have never told your smartphone.<br><br><div class="gmail_quote"><div dir="ltr">On Wed, 11 Jul 2018, 19:41 S.M. Muraya via kictanet, <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank" rel="noreferrer">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Stolen >> "every app on your phone is allowed un-monitored access to everything and that with your full consent.."</div><br><div class="gmail_quote"><div dir="ltr">On Wed, Jul 11, 2018 at 9:46 AM Admin CampusCiti via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" rel="noreferrer noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><div><span></span></div><div>Grace and all<div><br></div><div>This is a pertinent issue in 2018. First let me address this in the context of Policy and Legislation.</div><div><br></div><div>1. In the absence of solid Policy and laws regarding Data Security we are really groping in the dark. I appreciate that there are various initiatives ongoing to remedy this situation. From a personal data security there’s always the issue of who is accessing my data - this needs to be viewed from a personal security angle i.e hackers, unauthorized use of data by corporates, unsolicited communication using data mining tools, government subpoenas etc.</div><div><br></div><div>2. From a Corporate perspective the above is relevant but from a body corporate perspective. This becomes more important considering the magnitude of data some corporates hold and the potential liabilities and losses that can arise through data breaches. For example it is alleged that Kenyan banks lost Kshs.30 billion in the last 3 years. </div><div><br></div><div><a href="https://www.standardmedia.co.ke/business/article/2001232241/how-kenyan-banks-lost-sh30-billion-in-two-years-to-tech-savvy-criminals" rel="noreferrer noreferrer" target="_blank">https://www.standardmedia.co.ke/business/article/2001232241/how-kenyan-banks-lost-sh30-billion-in-two-years-to-tech-savvy-criminals</a></div><div><br></div><div>3. From a government perspective it takes on a National Security perspective. As the proliferation of Cloud Computing becomes standard operating procedure for most organizations governments are starting to ask pertinent questions about control, access to data etc. One critical issue that is now a major block is the one about Data Sovereignty. In a nutshell the issues around Data Sovereignty can be encapsulated in one sentence.</div><div><br></div><div><span style="background-color:rgba(255,255,255,0)"><b>Data sovereignty</b> comes into play when an organisation's <b>data</b> is stored outside of their country and is subject to the laws of the country in which the <b>data</b> resides. The main concern with <b>data sovereignty</b> is maintaining privacy regulations and keeping foreign countries from being able to subpoena <b>data</b>.</span></div><div><span style="background-color:rgba(255,255,255,0)"><br></span></div><div>Bottom line I’d urge us to expedite the building of both hard (roads, bridges, fiber etc) and soft (enabling policy, laws and regulations etc) infrastructure. Soft Infrastructure is not going in tandem with hard Infrastructure. Data Security is a key component of this. Without this in place we cannot expect Tier 4 Data Centre operators to even think about investing in Kenya.</div><div><br></div><div><div><div><span><b>Ali Hussein</b></span></div><div><br></div><div style="font-family:Helvetica;font-size:medium">+254 0713 601113 </div><div style="font-family:Helvetica;font-size:medium"><br></div><div><p style="margin:0in 0in 0pt"><span style="background-color:rgba(255,255,255,0)">Twitter: @AliHKassim</span></p><span style="background-color:rgba(255,255,255,0)"><font></font></span><p style="margin:0in 0in 0pt"><span style="background-color:rgba(255,255,255,0)">Skype: abu-jomo</span></p><p style="margin:0in 0in 0pt"><span style="background-color:rgba(255,255,255,0)">LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" rel="noreferrer noreferrer" target="_blank">http://ke.linkedin.com/in/alihkassim</a><a href="http://ke.linkedin.com/in/alihkassim" rel="noreferrer noreferrer" target="_blank"><span style="text-decoration:none"></span></a></span></p><span style="background-color:rgba(255,255,255,0)"><font></font></span><p style="margin:0in 0in 0pt"></p><font><span style="background-color:rgba(255,255,255,0)">Blog: <a href="http://www.alyhussein.com/" rel="noreferrer noreferrer" target="_blank">www.alyhussein.com</a></span><br></font></div><div><span><br></span></div><div>"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi</div><div><span><br></span></div>Sent from my iPad</div><div><br>On 11 Jul 2018, at 7:52 AM, Grace Bomu via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" rel="noreferrer noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr"><div class="gmail_default" style="font-family:verdana,sans-serif">Listers, <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Thank you to all who contributed to yesterday's topic. The thread is still open for those who may have further thoughts on content regulation. <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Welcome to Day 2 of online pre KIGF debates where out topic today is <span style="font-size:10pt;font-family:Arial;color:rgb(0,0,0);background-color:transparent;text-decoration:none;vertical-align:baseline;white-space:pre-wrap">Strengthening Data Security in the Context of Emerging Trends</span>. We shall look at cybersecurity in the context of data. <br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Barely a few weeks ago, social media was awash with memes of Wazir Boniface Chacha, the young man alleged to have conned MPs after getting access to their phone data. Later when this was used as a justification in debates for the Cybercrime Act, some wondered whether the political process had used the Chacha saga to justify the quick passage of a law creating offences. <br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">But beyond "small data" in our personal possession, many SMEs , corporations, institutions, societies and other bodies are holding significant amounts of data. <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">In this community, the wider issue of cyber security has been a recurring theme in KIGF. It is generally agreed that the best approach is a multi-pronged one that includes the law, good practices, effective mitigation and response to incidences at multiple levels, creation of awareness and technical solutions among others. Having gotten a new law in the form of the Cybercrimes Act, are we assured of data security? <br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Are our existing mechanisms for mitigation and response to incidences adequate for emerging threats?<br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Do we have positive cases or good practices to imitate?<br></div><div class="gmail_default" style="font-family:verdana,sans-serif">What challenges that remain and how can we address them? <br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Welcome to the discussion. <br clear="all"></div><br>-- <br><div data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Grace Mutung'u <br>Skype: gracebomu<br>@Bomu<br><span style="font-size:12.8px">PGP ID : 0x33A3450F</span><br></div><div><br></div></div></div></div></div></div></div>
</div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>kictanet mailing list</span><br><span><a href="mailto:kictanet@lists.kictanet.or.ke" rel="noreferrer noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a></span><br><span><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a></span><br><span>Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer noreferrer" target="_blank">http://twitter.com/kictanet</a></span><br><span>Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a></span><br><span>Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" rel="noreferrer noreferrer" target="_blank">www.eacdirectory.co.ke</a></span><br><span></span><br><span>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/info%40campusciti.com" rel="noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/info%40campusciti.com</a></span><br><span></span><br><span>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.</span><br><span></span><br><span>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</span><br></div></blockquote></div></div></div>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" rel="noreferrer noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer noreferrer noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer noreferrer noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" rel="noreferrer noreferrer noreferrer" target="_blank">www.eacdirectory.co.ke</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/murigi.muraya%40gmail.com" rel="noreferrer noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/murigi.muraya%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div>SMM</div><div><br></div><div><span style="line-height:13px;color:rgb(0,19,32);font-family:Trebuchet,Arial,Helvetica,sans-serif;text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="line-height:20px"><font size="1"><b>"Better a patient person than a warrior, one with self-control than one who takes a city." Prov 16:32</b></font></span><span style="font-size:14px;background-color:rgb(253,254,255)"><br></span></span></span></div></div></div></div></div>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" rel="noreferrer noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer noreferrer noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer noreferrer noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" rel="noreferrer noreferrer noreferrer" target="_blank">www.eacdirectory.co.ke</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/kmachuhi%40gmail.com" rel="noreferrer noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/kmachuhi%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div></div></div>
</blockquote></div><br><br>-- <br><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Grace Mutung'u <br>Skype: gracebomu<br>@Bomu<br><span style="font-size:12.8px">PGP ID : 0x33A3450F</span><br></div><div><br></div></div></div></div></div></div><br>
</blockquote><br><br>-- <br><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Grace Mutung'u <br>Skype: gracebomu<br>@Bomu<br><span style="font-size:12.8px">PGP ID : 0x33A3450F</span><br></div><div><br></div></div></div></div></div></div><br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank" rel="noreferrer">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
Domain Registration sponsored by <a href="http://www.eacdirectory.co.ke" rel="noreferrer noreferrer" target="_blank">www.eacdirectory.co.ke</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/johnpaulem%40gmail.com" rel="noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/johnpaulem%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div>
</blockquote></div><br><br>-- <br><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Grace Mutung'u <br>Skype: gracebomu<br>@Bomu<br><span style="font-size:12.8px">PGP ID : 0x33A3450F</span><br></div><div><br></div></div></div></div></div></div><br>
</blockquote></div>