<html><head></head><body><div class="ydpf5525a89yahoo-style-wrap" style="font-family: times new roman, new york, times, serif; font-size: 16px;"><div></div><div>On the contrary Phyllis. The downsides that I listed were <b>fact-based rebuttals</b> to the <b>most commonly purported upsides of UID systems</b>, which are:</div><div><br></div><div>1. counter-terrorism;<br></div><div>2. reducing financial/banking fraud;<br></div><div>3. solving illegal immigration;<br></div><div>4. better access to government services;<br></div><div>5. improving public data integrity;<br></div><div>6. countering identity theft.</div><div><br></div><div>The key questions to ponder, if we truly want to learn from India's experiences, are: </div><div><br></div><div><b>1.</b> <span>Without the above benefits, is the <b>business case</b> for a <b>Ksh. 3-6 Billion price tag</b> still sound and reasonable? If the idea is to promote <b>innovation</b>, can the 6 Billion do better if used as seed capital for 500 local startups - each getting a 10M seed funding + incubation services?<br></span></div><div><span> </span><br></div><div><b>2.</b> What <u><b><span>unequivocal </span>value</b></u> does the Aadhaar system add for the Indian people, that cannot be obtained or surpassed via less intrusive / risky / costly ways? <br></div><div><br></div><div><b>3.</b> India is far more advanced than Kenya technologically, yet they are facing all these problems and failures with UID tech. Kindly share your <u>concrete and specific thoughts</u> on <b>how Kenya can safeguard NIIMS</b> <b>better </b>than India (if that is in any way possible)?</div><div><br></div><div><b>4.</b> Indian Supreme Court has been examining the legal/constitutional issues and setting some <u>groundbreaking precedents</u>. Can/will these precedents influence constitutional challenges to NIIMS? If yes/maybe, it might be an interesting topic of discussion within the legal fraternity.<br></div><div><br></div><div>Would be great if you (or any lister with the info) can help by addressing the above questions in fairly <u>precise / specific terms</u> so as to build a more balanced and <b><u>fact-based understanding</u></b> of the risk/benefit scenario. <br></div><div><br></div><div>I'm open to learning and ready to adjust my views accordingly.<br></div><div><br></div>Brgds,<div>Patrick.<br></div><div><br></div><div><br></div><div><br></div>
</div><div id="ydp246bc191yahoo_quoted_0999306229" class="ydp246bc191yahoo_quoted">
<div style="font-family:'Helvetica Neue', Helvetica, Arial, sans-serif;font-size:13px;color:#26282a;">
<div>
On Friday, February 15, 2019, 2:55:29 PM GMT+3, <pkamau@pwkamauadvocates.co.ke> wrote:
</div>
<div><br></div>
<div><br></div>
<div><div dir="ltr">Patrick,<br></div><div dir="ltr"><br></div><div dir="ltr">You have mapped out only articles talking about the downsides of <br></div><div dir="ltr">Aaadhar, let us balance it with the articles that talk about the <br></div><div dir="ltr">positive use or how Aadhar has assisted India in financial inclusion, <br></div><div dir="ltr">innovation etc and why the courts have continued to weight in and infact <br></div><div dir="ltr">rule in favour of it on public interest grounds.<br></div><div dir="ltr"><br></div><div dir="ltr"><br></div><div dir="ltr">Only then can we develop a better system for our NIIMS. I believe there <br></div><div dir="ltr">are benefits in consolidating our bio-metrics and having a uniform <br></div><div dir="ltr">identifier if only we safeguard the system and learn from other <br></div><div dir="ltr">jurisdiction.<br></div><div dir="ltr"><br></div><div dir="ltr"><br></div><div dir="ltr"><br></div><div dir="ltr">On 2019-02-15 14:10, Patrick A. M. Maina wrote:<br></div><div dir="ltr">> 1. Aadhaar is currently the subject of POTENTIALLY SCANDALOUS NEWS<br></div><div dir="ltr">> COVERAGE ON DATA BREACH<br></div><div dir="ltr">> <br></div><div dir="ltr">> Aadhaar: Has UIDAI lied in its counter filed before the Delhi High<br></div><div dir="ltr">> Court? [1]<br></div><div dir="ltr">> <br></div><div dir="ltr">> AADHAAR: HAS UIDAI LIED IN ITS COUNTER FILED BEFORE THE DELHI HIGH<br></div><div dir="ltr">> COURT?<br></div><div dir="ltr">> <br></div><div dir="ltr">> UIDAI might just have provided false information in its counter filed<br></div><div dir="ltr">> before the Delhi High Court in Shamnad Bas...<br></div><div dir="ltr">> <br></div><div dir="ltr">> 2. AADHAAR HAS NOT REDUCED TERRORISM (not immune to insider<br></div><div dir="ltr">> corruption). In fact terrorists now POSSESS AADHAAR CARDS.<br></div><div dir="ltr">> <br></div><div dir="ltr">> Jaish-e-Mohammed terrorist from PoK caught, Aadhaar card recovered<br></div><div dir="ltr">> from him [2]<br></div><div dir="ltr">> <br></div><div dir="ltr">> JAISH-E-MOHAMMED TERRORIST FROM POK CAUGHT, AADHAAR CARD RECOVERED<br></div><div dir="ltr">> FROM HIM<br></div><div dir="ltr">> <br></div><div dir="ltr">> The official said the operation spanned two months, with security<br></div><div dir="ltr">> forces keeping a track of Rehman's movement in...<br></div><div dir="ltr">> <br></div><div dir="ltr">> US condemns Pulwama terror attack, asks Pakistan to deny support to<br></div><div dir="ltr">> terrorists [3]<br></div><div dir="ltr">> <br></div><div dir="ltr">> US CONDEMNS PULWAMA TERROR ATTACK, ASKS PAKISTAN TO DENY SUPPORT TO<br></div><div dir="ltr">> TERR...<br></div><div dir="ltr">> <br></div><div dir="ltr">> In a press release, the US Department of State said it condemns the<br></div><div dir="ltr">> terrorist attack on the Indian CRPF convoy a...<br></div><div dir="ltr">> <br></div><div dir="ltr">> 3. BANKING FRAUD IN INDIA RISES BY 72% IN 2018 under Aadhar regime.<br></div><div dir="ltr">> This includes Aadhar linked crime (BANKERS WORRIED)<br></div><div dir="ltr">> <br></div><div dir="ltr">> <a href="https://www.businesstoday.in/sectors/banks/bank-frauds-rise-over-72pc-to-rs-41167-crore-in-2017-18-says-rbi-report/story/305552.html" rel="nofollow" target="_blank">https://www.businesstoday.in/sectors/banks/bank-frauds-rise-over-72pc-to-rs-41167-crore-in-2017-18-says-rbi-report/story/305552.html</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> <a href="https://www.business-standard.com/article/finance/alarming-rise-in-banking-frauds-warns-rbi-117070300042_1.html" rel="nofollow" target="_blank">https://www.business-standard.com/article/finance/alarming-rise-in-banking-frauds-warns-rbi-117070300042_1.html</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> How fraud Aadhaar calls are targeting bank accounts - Times of India<br></div><div dir="ltr">> [4]<br></div><div dir="ltr">> <br></div><div dir="ltr">> HOW FRAUD AADHAAR CALLS ARE TARGETING BANK ACCOUNTS - TIMES OF INDIA<br></div><div dir="ltr">> <br></div><div dir="ltr">> GURUGRAM: Nidhi Sharma, a resident of Sector 10A, recently received a<br></div><div dir="ltr">> call from a person who claimed to be an ex...<br></div><div dir="ltr">> <br></div><div dir="ltr">> 4. Aadhaar's biometric SOURCE CODE BELONGS TO FOREIGN ENTITIES - this<br></div><div dir="ltr">> is a major sovereignty risk (noted by a dissenting INDIAN SUPREME<br></div><div dir="ltr">> COURT JUDGE).<br></div><div dir="ltr">> <br></div><div dir="ltr">> "Neither the Central Government nor the Unique Identification<br></div><div dir="ltr">> Authority of India(UIDAI) have the source code for the de-duplication<br></div><div dir="ltr">> technology which is at the heart of the programme. THE SOURCE CODE<br></div><div dir="ltr">> BELONGS TO A FOREIGN CORPORATION." THIS CREATES MASSIVE RISK OF<br></div><div dir="ltr">> ELECTIONS INTERFERENCE BY FOREIGN ENTITIES.<br></div><div dir="ltr">> <br></div><div dir="ltr">> _"Dignity and the rights of individuals cannot be made to depend on<br></div><div dir="ltr">> algorithms or probabilities. Constitutional guarantees cannot be<br></div><div dir="ltr">> subject to the vicissitudes of technology."_<br></div><div dir="ltr">> <br></div><div dir="ltr">> _"The leakage of sensitive personal information of 1.2 billion<br></div><div dir="ltr">> citizens, CANNOT BE REMEDIED BY A MERE CONTRACTUAL INDEMNITY. THE LOSS<br></div><div dir="ltr">> OF DATA IS IRRETRIEVABLE."_<br></div><div dir="ltr">> <br></div><div dir="ltr">> <a href="https://www.livelaw.in/foreign-company-has-source-code-of-aadhaar-project-it-has-access-to-citizens-information-certain-worrying-findings-by-justice-chandrachud/" rel="nofollow" target="_blank">https://www.livelaw.in/foreign-company-has-source-code-of-aadhaar-project-it-has-access-to-citizens-information-certain-worrying-findings-by-justice-chandrachud/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> 5. INDIAN SUPREME COURT okayed Aadhaar primarily for use by<br></div><div dir="ltr">> MARGINALIZED GROUPS to access WELFARE - but PLACED SEVERE LIMITATIONS<br></div><div dir="ltr">> ON OTHER USES: For example, Aadhaar is voluntary (save for welfare<br></div><div dir="ltr">> beneficiaries), the data CANNOT BE (LEGALLY) USED FOR NATIONAL<br></div><div dir="ltr">> SECURITY purposes, and the biometric data CANNOT BE (LEGALLY) USED BY<br></div><div dir="ltr">> THE PRIVATE SECTOR.<br></div><div dir="ltr">> <br></div><div dir="ltr">> Perhaps our good lawyers can advise - from an expert perspective -<br></div><div dir="ltr">> whether/how this judgment might influence Kenyan courts?<br></div><div dir="ltr">> <br></div><div dir="ltr">> <a href="https://thewire.in/law/supreme-court-upholds-validity-of-aadhaar-but-cant-link-to-bank-accounts-and-mobile-phones" rel="nofollow" target="_blank">https://thewire.in/law/supreme-court-upholds-validity-of-aadhaar-but-cant-link-to-bank-accounts-and-mobile-phones</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> 6. An analysis of AADHAAR FRAUD incidences / types.<br></div><div dir="ltr">> <br></div><div dir="ltr">> Aadhaar Fraud is Not Only Real, But is Worth More Closely Examining<br></div><div dir="ltr">> [5]<br></div><div dir="ltr">> <br></div><div dir="ltr">> AADHAAR FRAUD IS NOT ONLY REAL, BUT IS WORTH MORE CLOSELY EXAMINING<br></div><div dir="ltr">> <br></div><div dir="ltr">> An online examination of publicly reported incidents shows that<br></div><div dir="ltr">> contrary to its proponents’ claims, Aadhaar has ...<br></div><div dir="ltr">> <br></div><div dir="ltr">> What lessons can Kenya draw from this, in order to implement NIIMS<br></div><div dir="ltr">> better?<br></div><div dir="ltr">> <br></div><div dir="ltr">> Good day,<br></div><div dir="ltr">> Patrick.<br></div><div dir="ltr">> <br></div><div dir="ltr">> On Thursday, February 14, 2019, 1:00:16 PM GMT+3, pkamau--- via<br></div><div dir="ltr">> kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">> My thoughts on the NIIMS is we have to give the new move greater<br></div><div dir="ltr">> thought<br></div><div dir="ltr">> <br></div><div dir="ltr">> . I think we need to look to the case in India and the benefits of the<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> Aadhaar system which is similar to the NIIMs and the general direction<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> India took to open data in building the Indian Stack. Several cases<br></div><div dir="ltr">> were<br></div><div dir="ltr">> <br></div><div dir="ltr">> brought to challenge the Aadhaar on privacy issues and risk of<br></div><div dir="ltr">> <br></div><div dir="ltr">> government surveillance but courts in India have continued to hold<br></div><div dir="ltr">> that<br></div><div dir="ltr">> <br></div><div dir="ltr">> the public interest benefits of the Aadhaar far much outweigh the<br></div><div dir="ltr">> <br></div><div dir="ltr">> privacy concerns and have allowed the Aadhaar to continue. In<br></div><div dir="ltr">> retrospect<br></div><div dir="ltr">> <br></div><div dir="ltr">> since Aadhaar was launched in 2009, they have managed to register<br></div><div dir="ltr">> <br></div><div dir="ltr">> majority of Indians and used it to build the Indian Stack.<br></div><div dir="ltr">> <br></div><div dir="ltr">> Perhaps what we need is to recommend more structure and administrative<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> safeguards for the NIIMS. In the long-term the NIIMS may be of greater<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> benefit to us especially the potential that kid of data could play in<br></div><div dir="ltr">> <br></div><div dir="ltr">> innovation. We need to protect privacy but at the same time we need to<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> thing strategically how better data can assist resolve issues and<br></div><div dir="ltr">> layer<br></div><div dir="ltr">> <br></div><div dir="ltr">> innovation for the general good.<br></div><div dir="ltr">> <br></div><div dir="ltr">> I do agree the data protection bill must be past but beyond this, what<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> is our overall goal if we were to have better data in a government<br></div><div dir="ltr">> <br></div><div dir="ltr">> platform that can be open, accessible like the Aadhaar and several<br></div><div dir="ltr">> API's<br></div><div dir="ltr">> <br></div><div dir="ltr">> can be built on that architecture to drive innovation?<br></div><div dir="ltr">> <br></div><div dir="ltr">> Is it time to push more for Open Data in line with the Data Protection<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> Bill?<br></div><div dir="ltr">> <br></div><div dir="ltr">> Thanks,<br></div><div dir="ltr">> <br></div><div dir="ltr">> Phyllis<br></div><div dir="ltr">> <br></div><div dir="ltr">> On 2019-02-14 08:19, Barrack Otieno via kictanet wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>> Dear Alice,<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> Many thanks for this update from Mozilla. There is need for wider<br></div><div dir="ltr">> <br></div><div dir="ltr">>> stakeholder engagement on this issue. While the government has a<br></div><div dir="ltr">> <br></div><div dir="ltr">>> legitimate concern which i presume is taming acts of terrorism,<br></div><div dir="ltr">> there<br></div><div dir="ltr">> <br></div><div dir="ltr">>> is need for wider consultations especially on the areas that<br></div><div dir="ltr">> <br></div><div dir="ltr">>> contravene or appear to contravene the constitution.<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> Thank you<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> Best Regards<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> On Wed, 13 Feb 2019 18:17 Alice Munyua via kictanet<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <<a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://blog.mozilla.org/netpolicy/2019/02/08/kenya-government-mandates-dna-linked-national-id-without-data-protection-law/" rel="nofollow" target="_blank">https://blog.mozilla.org/netpolicy/2019/02/08/kenya-government-mandates-dna-linked-national-id-without-data-protection-law/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> KENYA GOVERNMENT MANDATES DNA-LINKED NATIONAL ID, WITHOUT DATA<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> PROTECTION LAW<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Alice Munyua February 8, 2019<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> No responses yet [1]<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Last month, the Kenya Parliament passed a seriously concerning<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> amendment [2] to the country’s national ID law, making Kenya home<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> to the most privacy-invasive national ID system in the world. The<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> rebranded, National Integrated Identity Management System (NIIMS)<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> now requires all Kenyans, immigrants, and refugees to turn over<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> their DNA, GPS coordinates of their residential address, retina<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> scans, iris pattern, voice waves, and earlobe geometry before being<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> issued critical identification documents. NIIMS will consolidate<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> information contained in other government agency databases and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> generate a unique identification number known as Huduma Namba.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> It is hard to see how this system comports with the right to<br></div><div dir="ltr">> privacy<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> articulated in Article 31 of the Kenyan Constitution. It is deeply<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> troubling that these amendments passed without public debate, and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> were approved even as a data protection bill which would designate<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> DNA and biometrics as sensitive data is pending.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Before these amendments, in order to issue the National ID Card<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> (ID), the government only required name, date and place of birth,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> place of residence, and postal address. The ID card is a critical<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> document that impacts everyday life, [3] without it, an individual<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> cannot vote, purchase property, access higher education, obtain<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> employment, access credit, or public health, among other<br></div><div dir="ltr">> fundamental<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> rights.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Mozilla strongly believes that that no digital ID system should be<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> implemented without strong privacy and data protection legislation.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> The proposed Data Protection Bill of 2018 which Parliament is<br></div><div dir="ltr">> likely<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> to consider next month, is a strong and thorough framework that<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> contains provisions relating to data minimization as well as<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> collection and purpose limitation. If NIIMS is implemented, it<br></div><div dir="ltr">> will<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> be in conflict with these provisions, and more importantly in<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> conflict with Article 31 of the Constitution, which specifically<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> protects the right to privacy.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Proponents [4] of NIIMS claim that the system provides a number of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> benefits, such as accurate delivery of government services. These<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> arguments also seem to conflate legal and digital identity. Legal<br></div><div dir="ltr">> ID<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> used to certify one’s identity through basic data about one’s<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> personhood (such as your name and the date and place of your birth)<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> is a commendable goal. It is one of the United Nations Sustainable<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Development Goals 16.9 [5] that aims _“to provide legal identity<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> for all, including birth registration by 2030”_. However, it is<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> important to remember this objective can be met in several ways.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> “Digital ID” systems, and especially those that involve<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> sensitive biometrics or DNA, are not a necessary means of verifying<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> identity, and in practice raise significant privacy and security<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> concerns. The choice of whether to opt for a digital ID let alone a<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> biometric ID therefore should be closely scrutinized by governments<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> in light of these risks, rather than uncritically accepted as<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> beneficial.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> * SECURITY CONCERNS: THE CENTRALIZED NATURE OF NIIMS CREATES<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> MASSIVE SECURITY VULNERABILITIES. IT COULD BECOME A HONEYPOT FOR<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> MALICIOUS ACTORS AND IDENTITY THIEVES WHO CAN EXPLOIT OTHER<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> IDENTIFYING INFORMATION LINKED TO STOLEN BIOMETRIC DATA. THE<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> AMENDMENT IS UNCLEAR ON HOW THE GOVERNMENT WILL ESTABLISH AND<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> INSTITUTE STRONG SECURITY MEASURES REQUIRED FOR THE PROTECTION OF<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> SUCH A SENSITIVE DATABASE. IF THERE’S A BREACH, IT’S NOT AS IF<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> YOUR DNA OR RETINA CAN BE RESET LIKE A PASSWORD OR TOKEN.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> * SURVEILLANCE CONCERNS: BY CENTRALIZING A TREMENDOUS AMOUNT OF<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> SENSITIVE DATA IN A GOVERNMENT DATABASE, NIIMS CREATES AN<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> OPPORTUNITY FOR MASS SURVEILLANCE BY THE STATE. NOT ONLY IS THE<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> COLLECTION OF BIOMETRICS INCREDIBLY INVASIVE, BUT GATHERING THIS<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> DATA COMBINED WITH TRANSACTION LOGS OF WHERE ID IS USED COULD<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> SUBSTANTIALLY REDUCE ANONYMITY. THIS IS ALL THE MORE WORRYING<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> CONSIDERING KENYA’S HISTORY OF EXTRALEGAL SURVEILLANCE AND<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> INTELLIGENCE SHARING [6].<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> * ETHNIC DISCRIMINATION CONCERNS: THE COLLECTION OF DNA IS<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> PARTICULARLY CONCERNING AS THIS INFORMATION CAN BE USED TO IDENTIFY<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> AN INDIVIDUAL’S ETHNIC IDENTITY. GIVEN KENYA’S HISTORY OF<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> POLITICIZATION OF ETHNIC IDENTITY [7], COLLECTING THIS DATA IN A<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> CENTRALIZED DATABASE LIKE NIIMS COULD REPRODUCE AND EXACERBATE<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> PATTERNS OF DISCRIMINATION.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> THE PROCESS WAS NOT CONSTITUTIONAL<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Kenya’s constitution requires public input before any new law can<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> be adopted. No public discussions were conducted for this<br></div><div dir="ltr">> amendment.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> It was offered for parliamentary debate under “_Miscellaneous_”<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> amendments, which exempted it from procedures and scrutiny that<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> would have required introduction as a substantive bill and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> corresponding public debate. The Kenyan government must not<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> implement this system without sufficient public debate and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> meaningful engagement to determine how such a system should be<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> implemented if at all.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> The proposed law does not provide people with the opportunity to<br></div><div dir="ltr">> opt<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> in or out of giving their sensitive and precise data. The<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Constitution requires that all Kenyans be granted identification.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> However, if an individual were to refuse to turn over their DNA or<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> other sensitive information to the State, as they should have the<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> right to do, they could risk not being issued their identity or<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> citizenship documents. Such a denial would contravene Articles 12,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> 13, and 14 of the Constitution.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Opting out of this system should not be used to discriminate or<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> exclude any individual from accessing essential public services and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> exercising their fundamental rights.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Individuals must be in full control of their digital identities<br></div><div dir="ltr">> with<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the right to object to processing and use and withdraw consent.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> These aspects of control and choice are essential to empowering<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> individuals in the deployment of their digital identities.<br></div><div dir="ltr">> Therefore<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> policy and technical decisions must take into account systems that<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> allow individuals to identify themselves rather than the system<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> identifying them.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Mozilla urges the government of Kenya to suspend the implementation<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> of NIIMS and we hope Kenyan members of parliament will act swiftly<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> to pass the Data Protection Bill of 2018.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> On 23/01/2019 00:28, Gideon via kictanet wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Listers,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Would this be a similar system like the India's Aadhaar which is<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> said to be the world's largest biometric ID system? If so what<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> lessons and drawbacks could be learned?<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Many issues would need to be addressed as a foundamental step, such<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> include privacy, ethics, security of the said system,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> complementarity with the existing official databases e.t.c<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Regards<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> GR<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> On Tue, Jan 22, 2019 at 10:01 PM<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <<a href="mailto:kictanet-request@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet-request@lists.kictanet.or.ke</a>> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Send kictanet mailing list submissions to<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> To subscribe or unsubscribe via the World Wide Web, visit<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> or, via email, send a message with subject or body 'help' to<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="mailto:kictanet-request@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet-request@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> You can reach the person managing the list at<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="mailto:kictanet-owner@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet-owner@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> When replying, please edit your Subject line so it is more specific<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> than "Re: Contents of kictanet digest..."<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Today's Topics:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> 1. Re: law to start listing of Kenyans? DNA (Warigia Bowman)<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> ----------------------------------------------------------------------<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Message: 1<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Date: Tue, 22 Jan 2019 12:58:59 -0600<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> From: Warigia Bowman <<a href="mailto:warigia@gmail.com" rel="nofollow" target="_blank">warigia@gmail.com</a>><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> To: gertrude matata <<a href="mailto:gertrudematata@yahoo.com" rel="nofollow" target="_blank">gertrudematata@yahoo.com</a>>, KICTAnet ICT<br></div><div dir="ltr">> Policy<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Discussions <<a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a>><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Subject: Re: [kictanet] law to start listing of Kenyans? DNA<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Message-ID:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <<a href="mailto:CACeY99TvKOX13-RtN1gjCi_sh4AF8jdnEkJTNHD6WMrFR9Pogg@mail.gmail.com" rel="nofollow" target="_blank">CACeY99TvKOX13-RtN1gjCi_sh4AF8jdnEkJTNHD6WMrFR9Pogg@mail.gmail.com</a>><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Content-Type: text/plain; charset="utf-8"<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> This is disturbing. I am quite sure that the US government does not<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> have<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the right to take DNA samples from citizens.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Biometric data is not the same as DNA, rather it may include<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> fingerprints<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and eyescans. This is a move towards a surveillance state.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> On Tue, Jan 22, 2019 at 6:24 AM gertrude matata via kictanet <<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Dear Listers,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The amendment to the Act seems to have ignored Article 31(c) of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Constitution. This being a constitutional issue, there is probably<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> a need<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> to subject it to constitutional interpretation on;<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> what was the intention of the article in providing that such<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> information<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> should not be unnecessarily required or revealed;<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Whether such details being availed to persons registry clerks is<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> defeating that intent;<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> and whether the circumstances demand the "unnecessarily"<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> revealed bar<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> to be lifted.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> It is worthy to ponder the situation in terms of whether<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> giving<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> such information might not create inborn terror,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Regards,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Gertrude<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> GERTRUDE MATATA<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> HILLSIDE APARTMENTS<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> 4TH FLOOR, Apartments 11<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> RAGATI ROAD,Opposite N.H.I.F<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> NEAR CAPITOL HILL POLICE STATION<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> P.O. Box 517-00517<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Nairobi<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Mobile:0722-374109/0772327265<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Go to;<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="https://themediatorkenya.wordpress.com/author/themediatorkenya/" rel="nofollow" target="_blank">https://themediatorkenya.wordpress.com/author/themediatorkenya/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> *DISCLAIMER*<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> This email and any attachments to it may be confidential and are<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> intended<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> solely for the use of the individual to whom it is addressed. Any<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> views or<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> opinions expressed are solely those of the author and do not<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> necessarily<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> represent those of GERTRUDE MATATA.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> If you are not the intended recipient of this email, you must<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> neither take<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> any action based upon its contents, nor copy or show it to anyone.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Please contact the sender if you believe you have received this<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> email in<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> error.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Call<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Send SMS<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Call from mobile<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Add to Skype<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> You'll need Skype CreditFree via Skype<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> On Tuesday, January 22, 2019, 2:14:05 PM GMT+3, Karanja Marigu via<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> This is a classical move that also was taken by USA after 911.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> What do we<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> expect next? Marshal law??<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Terrorism is not a justification to take away our privacy rights<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> collect data. What they will do with all that data, only God<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> knows.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Best Regards,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Karanja Marigu,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> 'Purpose fuels passion'<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> On Tue, 22 Jan 2019 at 09:10, Magdalene Kariuki via kictanet <<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Dear fellow listers,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Happy New Year (albeit late).<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Thank you Grace for sharing this information.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Just a few concerns about privacy of persons and the protection<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and use of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> information.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> While I appreciate and understand the need for Government to<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> address<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> issues relating to threats to security (assuming that this is<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> where the<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> need for such kind of information stems from), what kind of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> guarantees are<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> there that ensure this information is not traded? What kind of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> data<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> protection mechanisms are in place?<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> or have these concerns already been raised and addressed in the<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> new<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> legislation?<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Regards,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Magdalene<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> On Mon, Jan 21, 2019 at 12:16 PM Grace Bomu via kictanet <<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Full story here<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://www.businessdailyafrica.com/economy/Uhuru-backs-law-change/3946234-4943254-s1fi2b/index.html" rel="nofollow" target="_blank">https://www.businessdailyafrica.com/economy/Uhuru-backs-law-change/3946234-4943254-s1fi2b/index.html</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Il giorno lun 21 gen 2019 alle ore 14:51 Grace Bomu<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <<a href="mailto:nmutungu@gmail.com" rel="nofollow" target="_blank">nmutungu@gmail.com</a>><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> ha scritto:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Listers,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The government is now free to collect data on Kenyans? DNA and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> physical<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> location of their homes including satellite details during<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> registration of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> persons.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> This follows President Uhuru Kenyatta?s approval of amendments to<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Registration of Persons Act that has included the two to the list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> of<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> requirements needed at the national people?s registry.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Adults applying for documents such as IDs will be required to<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> provide<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> additional information about their location, including land<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> reference<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> number, plot number or house number.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The ministry is also seeking to introduce Global Positioning<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> System (GPS)<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> coordinates in the registration of persons, enabling the tracking<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> of their<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> location via satellite.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> More here<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> --<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Grace Mutung'u<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Skype: gracebomu<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> @Bomu<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> PGP ID : 0x33A3450F<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> --<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Grace Mutung'u<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Skype: gracebomu<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> @Bomu<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> PGP ID : 0x33A3450F<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/magdalene.kariuki%40gmail.com" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/magdalene.kariuki%40gmail.com</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> platform<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> for people and institutions interested and involved in ICT policy<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> regulation. The network aims to act as a catalyst for reform in<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> sector in support of the national aim of ICT enabled growth and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> behaviors<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> bandwidth,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> share knowledge, don't flame or abuse or personalize, respect<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> privacy, do<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> not spam, do not market your wares or qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/karanjaemarigu%40gmail.com" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/karanjaemarigu%40gmail.com</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> platform<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> for people and institutions interested and involved in ICT policy<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> regulation. The network aims to act as a catalyst for reform in<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> sector in support of the national aim of ICT enabled growth and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> behaviors<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> bandwidth,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> share knowledge, don't flame or abuse or personalize, respect<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> privacy, do<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> not spam, do not market your wares or qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/gertrudematata%40yahoo.com" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/gertrudematata%40yahoo.com</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> platform<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> for people and institutions interested and involved in ICT policy<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> regulation. The network aims to act as a catalyst for reform in<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> sector in support of the national aim of ICT enabled growth and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> behaviors<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> bandwidth,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> share knowledge, don't flame or abuse or personalize, respect<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> privacy, do<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> not spam, do not market your wares or qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/warigia%40gmail.com" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/warigia%40gmail.com</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> platform<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> for people and institutions interested and involved in ICT policy<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> regulation. The network aims to act as a catalyst for reform in<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> sector in support of the national aim of ICT enabled growth and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> behaviors<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> bandwidth,<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> share knowledge, don't flame or abuse or personalize, respect<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> privacy, do<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> not spam, do not market your wares or qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> --<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> *"Education is the most powerful weapon which you can use to change<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> the<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> world."* Nelson Mandela<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> -------------- next part --------------<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> An HTML attachment was scrubbed...<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> URL:<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <<a href="https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20190122/cfac6f57/attachment.html" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20190122/cfac6f57/attachment.html</a>><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> ------------------------------<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Subject: Digest Footer<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> ------------------------------<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> End of kictanet Digest, Vol 131, Issue 38<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> *****************************************<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/alice%40dotafrica.org" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/alice%40dotafrica.org</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> platform for people and institutions interested and involved in ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> policy and regulation. The network aims to act as a catalyst for<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> reform in the ICT sector in support of the national aim of ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> enabled growth and development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> behaviors online that you follow in real life: respect people's<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> times and bandwidth, share knowledge, don't flame or abuse or<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> personalize, respect privacy, do not spam, do not market your wares<br></div><div dir="ltr">> <br></div><div dir="ltr">>>> or qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/otieno.barrack%40gmail.com" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/otieno.barrack%40gmail.com</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>> platform for people and institutions interested and involved in ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>> policy and regulation. The network aims to act as a catalyst for<br></div><div dir="ltr">> <br></div><div dir="ltr">>> reform in the ICT sector in support of the national aim of ICT<br></div><div dir="ltr">> enabled<br></div><div dir="ltr">> <br></div><div dir="ltr">>> growth and development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> behaviors<br></div><div dir="ltr">> <br></div><div dir="ltr">>> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> <br></div><div dir="ltr">>> bandwidth, share knowledge, don't flame or abuse or personalize,<br></div><div dir="ltr">> <br></div><div dir="ltr">>> respect privacy, do not spam, do not market your wares or<br></div><div dir="ltr">> <br></div><div dir="ltr">>> qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> Links:<br></div><div dir="ltr">> <br></div><div dir="ltr">>> ------<br></div><div dir="ltr">> <br></div><div dir="ltr">>> [1]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://blog.mozilla.org/netpolicy/2019/02/08/kenya-government-mandates-dna-linked-national-id-without-data-protection-law/#respond" rel="nofollow" target="_blank">https://blog.mozilla.org/netpolicy/2019/02/08/kenya-government-mandates-dna-linked-national-id-without-data-protection-law/#respond</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> [2]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="http://kenyalaw.org/kl/fileadmin/pdfdownloads/AmendmentActs/2018/StatuteLawMischellaneousNo18of2018.pdf" rel="nofollow" target="_blank">http://kenyalaw.org/kl/fileadmin/pdfdownloads/AmendmentActs/2018/StatuteLawMischellaneousNo18of2018.pdf</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> [3]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://www.khrc.or.ke/2015-03-04-10-37-01/blog/675-a-call-to-action-to-end-statelessness-in-kenya.html" rel="nofollow" target="_blank">https://www.khrc.or.ke/2015-03-04-10-37-01/blog/675-a-call-to-action-to-end-statelessness-in-kenya.html</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> [4]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://www.businessdailyafrica.com/analysis/ideas/Kenya-needs-unified-identity-registration/4259414-4846478-119h6iqz/index.html" rel="nofollow" target="_blank">https://www.businessdailyafrica.com/analysis/ideas/Kenya-needs-unified-identity-registration/4259414-4846478-119h6iqz/index.html</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> [5]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <a href="https://unstats.un.org/sdgs/metadata/?Text=&Goal=16&Target=16.9" rel="nofollow" target="_blank">https://unstats.un.org/sdgs/metadata/?Text=&Goal=16&Target=16.9</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> [6]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://privacyinternational.org/sites/default/files/2017-10/track_capture_final.pdf" rel="nofollow" target="_blank">https://privacyinternational.org/sites/default/files/2017-10/track_capture_final.pdf</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> [7]<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://www.khrc.or.ke/publications/183-ethnicity-and-politicization-in-kenya/file.html" rel="nofollow" target="_blank">https://www.khrc.or.ke/publications/183-ethnicity-and-politicization-in-kenya/file.html</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">>> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> Unsubscribe or change your options at<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/pkamau%40pwkamauadvocates.co.ke" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/pkamau%40pwkamauadvocates.co.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> <br></div><div dir="ltr">>> platform for people and institutions interested and involved in ICT<br></div><div dir="ltr">> <br></div><div dir="ltr">>> policy and regulation. The network aims to act as a catalyst for<br></div><div dir="ltr">> <br></div><div dir="ltr">>> reform in the ICT sector in support of the national aim of ICT<br></div><div dir="ltr">> enabled<br></div><div dir="ltr">> <br></div><div dir="ltr">>> growth and development.<br></div><div dir="ltr">> <br></div><div dir="ltr">>> <br></div><div dir="ltr">> <br></div><div dir="ltr">>> KICTANetiquette : Adhere to the same standards of acceptable<br></div><div dir="ltr">> behaviors<br></div><div dir="ltr">> <br></div><div dir="ltr">>> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> <br></div><div dir="ltr">>> bandwidth, share knowledge, don't flame or abuse or personalize,<br></div><div dir="ltr">> <br></div><div dir="ltr">>> respect privacy, do not spam, do not market your wares or<br></div><div dir="ltr">> <br></div><div dir="ltr">>> qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">> _______________________________________________<br></div><div dir="ltr">> <br></div><div dir="ltr">> kictanet mailing list<br></div><div dir="ltr">> <br></div><div dir="ltr">> <a href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow" target="_blank">kictanet@lists.kictanet.or.ke</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> Twitter: <a href="http://twitter.com/kictanet" rel="nofollow" target="_blank">http://twitter.com/kictanet</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="nofollow" target="_blank">https://www.facebook.com/KICTANet/</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> Unsubscribe or change your options at<br></div><div dir="ltr">> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/pmaina2000%40yahoo.com" rel="nofollow" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/pmaina2000%40yahoo.com</a><br></div><div dir="ltr">> <br></div><div dir="ltr">> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br></div><div dir="ltr">> platform for people and institutions interested and involved in ICT<br></div><div dir="ltr">> policy and regulation. The network aims to act as a catalyst for<br></div><div dir="ltr">> reform in the ICT sector in support of the national aim of ICT enabled<br></div><div dir="ltr">> growth and development.<br></div><div dir="ltr">> <br></div><div dir="ltr">> KICTANetiquette : Adhere to the same standards of acceptable behaviors<br></div><div dir="ltr">> online that you follow in real life: respect people's times and<br></div><div dir="ltr">> bandwidth, share knowledge, don't flame or abuse or personalize,<br></div><div dir="ltr">> respect privacy, do not spam, do not market your wares or<br></div><div dir="ltr">> qualifications.<br></div><div dir="ltr">> <br></div><div dir="ltr">> <br></div><div dir="ltr">> Links:<br></div><div dir="ltr">> ------<br></div><div dir="ltr">> [1] <a href="https://barandbench.com/aadhaar-data-leaks-uidai-counter-delhi-hc/" rel="nofollow" target="_blank">https://barandbench.com/aadhaar-data-leaks-uidai-counter-delhi-hc/</a><br></div><div dir="ltr">> [2]<br></div><div dir="ltr">> <a href="https://economictimes.indiatimes.com/news/defence/jaish-e-mohammed-terrorist-from-pok-caught-aadhaar-card-recovered-from-him/articleshow/52279688.cms" rel="nofollow" target="_blank">https://economictimes.indiatimes.com/news/defence/jaish-e-mohammed-terrorist-from-pok-caught-aadhaar-card-recovered-from-him/articleshow/52279688.cms</a><br></div><div dir="ltr">> [3]<br></div><div dir="ltr">> <a href="https://www.indiatoday.in/india/story/us-condemns-pulwama-terror-attack-asks-pakistan-to-deny-support-to-terrorists-1456635-2019-02-15" rel="nofollow" target="_blank">https://www.indiatoday.in/india/story/us-condemns-pulwama-terror-attack-asks-pakistan-to-deny-support-to-terrorists-1456635-2019-02-15</a><br></div><div dir="ltr">> [4]<br></div><div dir="ltr">> <a href="https://timesofindia.indiatimes.com/city/gurgaon/how-fraud-aadhaar-calls-are-targeting-bank-accounts/articleshow/65156145.cms" rel="nofollow" target="_blank">https://timesofindia.indiatimes.com/city/gurgaon/how-fraud-aadhaar-calls-are-targeting-bank-accounts/articleshow/65156145.cms</a><br></div><div dir="ltr">> [5] <a href="https://thewire.in/economy/aadhaar-fraud-uidai" rel="nofollow" target="_blank">https://thewire.in/economy/aadhaar-fraud-uidai</a><br></div></div>
</div>
</div></body></html>