<div dir="ltr"><div>from Julius Njiraini</div><div>Computer security and Forensic consultants</div><div>0724293490</div><div>my proposal to ICT Policy discussion<br></div><div>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><b><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">INTRODUCTION<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Information technology architects must build
applications, systems, and networks that match ordinary users' expectations of
trust in terms of identity, authentication, service level agreements, and
privacy. These will help in <span> </span>addressing <span> </span>every layer of business, technology, people,
and process. The trust model relies on complete requirements that include
business, technical, legal, regulatory, and fiduciary requirements. It does
this by offering secure </span><span>services,
implemented within a secure component and which can be used at each </span><span>level of a Chain of Trust: from the boot
mechanism, to the device </span><span>operating
</span><span>system</span><span>(OS) </span><span>and
up to the application layer</span>. A device <span>OS
</span><span>is typically the main OS of
the device that runs applications and/or </span><span>services.
In the case of smartphones, it can be an OS such as Android. On other </span><span>Internet</span><span>-of-Things
(IoT) devices, examples may include a Linux</span><span>-based
OS or a real</span>-<span>time operating
system (RTOS)</span><span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><b><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">PROCESS.<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Step 1</span><span>:
<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Root of Trust services to the device boot mechanism,
including device </span><span>identification
and attestation services</span><span>- Since
the boot is assisted by the Root of </span><span>Trust
from the secure component, the integrity of the device boot chain process is </span><span>assured and protection offered against
various attacks and infections from malware. </span><span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Step 2: </span><span></span></p>
<span>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Secure services to protect the d</span><span>evice </span><span>OS</span><span>- A connection between the </span><span>device </span><span>OS
and the secure component enables the d</span><span>evice</span><span> OS to access highly secure </span><span>services within the secure component. These
can be used to protect the assets of the </span><span>OS,
such as its certificates and update processes. Applicat</span><span>ion assets, such as data </span><span>and keys, and end-</span><span>user authentication also need to be
protected. Thanks to the </span><span>secure
component, they too can access the most advanced level of security services. </span><span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Step 3: <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Dedicated security services for device applications </span><span>- To of</span><span>fer
most value-</span><span>added services
(VAS), device applications require more advanced security services </span><span>that are optimized (in terms of security,
performance etc.) and tailored for that </span><span>particular
application (e.g. providing specific algorithms). Dedicated securi</span><span>ty services </span><span>can
be loaded as needed into a secure component and made accessible to the </span><span>device applications which require them</span>.<span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:"Times New Roman","serif"">Digital service providers need to be
confident that they can connect their business activities and back end systems
with end-point devices which are trusted. This reassures them that they are
interacting with, and serving, the right customers. While the trusted end-point
is vital to their service delivery, so too is a secure communication channel
between the service provider’s server and the end user device. A secure channel
enables service providers to confidently use the secure services on the device,
such as those which allow them to: <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpFirst" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Enable or update digital services<span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Enroll end users / devices to the
service provider platform;<span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Authenticate end users<span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Store private data<span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Authenticate data generated by the
device; <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Protect data generated by the device
ahead of data transmission <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:"Times New Roman","serif""><span> </span></span></p>
<p class="gmail-MsoListParagraphCxSpLast" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><b><span style="font-size:12pt;font-family:"Times New Roman","serif""><span> </span>exchange in the
cloud. <span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:"Times New Roman","serif"">For Cloud Platform Providers In
today’s connected device ecosystem, the cloud platform provider has become
firmly established as an actor which provides a platform that enables end-users
and suppliers to interact and / or conduct transactions. There are different
examples of this new ecosystem player: for example, app stores (e.g. the App
Store, Play Store) for smartphone and tablet applications; online market places
for consumers (e.g. Amazon, Alibaba); and IoT cloud platform providers (e.g.
Azure, Google, Artik, etc.) for enterprise and M2M applications. All cloud
platform providers need to remotely and securely enroll and manage connected
devices; this enables the cloud provider to offer new services and send regular
updates. Secure end user and device authentication is also commonly required,
to ensure that the provider is interacting with the intended devices and
audience. The key requirements of cloud platform providers are: <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:"Times New Roman","serif"">Enrollment - Complexities arise with
device enrollment when the cloud platform provider needs to enroll a variety of
devices from heterogeneous domains (e.g. healthcare, energy, home automation,
etc.) and from different manufacturers. Reliable device enrollment is critical
for IoT cloud platform providers across M2M and enterprise use cases. The Chain
of Trust established by the GlobalPlatform Device Trust Architecture supports
device identification and offers a solution for the secure storage of identity
credentials allocated by cloud platform providers. <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpFirst" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Remote management - Cloud platform
providers must always be able to remotely manage devices. To do this, the
devices need to be trusted end-points and they need a secure channel which
allows them to engage with the right devices and be sure that their update
processes are not compromised. <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpLast" style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Authentication - End user and device
authentication are required across both consumer and M2M use cases, to allow
the correct access to platform services and to ensure non-repudiation. The
cloud platform provider needs to use the secure services available on the
device for this purpose. <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif""><span> </span>WHY IS THE DEVICE TRUST ARCHITECTURE NEEDED? <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">The
connected device landscape is expanding rapidly. New devices and device types
are being connected to a range of different cloud platforms, new device
operating systems are being created and digital services are being developed.
Yet not all devices are secure enough to protect against threats and attacks.
Considering the sensitive nature of data being gathered and exchanged between
many connected devices, the lack of standardized security poses a significant
risk across the complete ecosystem. For digital services to be a success:<span></span></span></p>
<p class="gmail-MsoListParagraphCxSpFirst" style="margin:0in 0in 0.0001pt 0.5in;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Service
providers need to trust that the devices which are responsible for gathering
and sending back service-related data are fully protected and updatable against
future attack threats. <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Device
makers need to support a range of device OS, securely connect to multiple cloud
platform providers and offer the right level of security services to service
providers. <span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;line-height:115%;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">Cloud
platform providers need to securely enroll many device types, running a wide
range of different secure services. End to end data integrity, from verifiable
devices, is fundamental to their business model; big data is useless if you
cannot trust the source of that data. Collaboration between these key
stakeholders on securing digital services must therefore be a priority or the
IoT ecosystem will not realize its full potential and ‘big brand’ IoT data
breaches could become the norm</span><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif""><span></span></span></p>
<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.5in;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif""><b><span style="font-size:12pt;line-height:115%;font-family:"Times New Roman","serif"">SOLUTION<span></span></span></b></p>
<p class="gmail-MsoListParagraphCxSpLast" style="line-height:normal;margin:0in 0in 10pt 0.5in;font-size:11pt;font-family:"Calibri","sans-serif""><b><span style="font-size:12pt;font-family:"Times New Roman","serif""><span>1.<span style="font:7pt "Times New Roman""> </span></span></span></b><b><span style="font-size:12pt;font-family:"Times New Roman","serif"">Digital Certificate<span></span></span></b></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 10pt;font-size:11pt;font-family:"Calibri","sans-serif""><span style="font-size:12pt;font-family:"Times New Roman","serif"">A <b>Digital Certificate</b> is used
to encrypt online data/information communications between an end-users browser
and a website. After verifying that a company owns a website, certificate
authority will sign their certificate so it is trusted by internet browsers. </span><span style="font-size:12pt;font-family:"Times New Roman","serif"">Digital
Certificates are a means by which consumers and businesses can utilise the
security applications of <b>Public Key Infrastructure</b> (PKI). PKI comprises
of the technology to enables secure e-commerce and Internet based communication
by providing the following<span></span></span></p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman","serif""><strong>Identification / Authentication:</strong><b><br>
</b>The persons / entities with whom we are communicating are really who they
say they are.</p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman","serif""><strong>Confidentiality:</strong><b><br>
</b>The information within the message or transaction is kept confidential. It
may only be read and understood by the intended sender and receiver.</p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman","serif""><strong>Integrity:</strong><b><br>
</b>The information within the message or transaction is not tampered
accidentally or deliberately with en route without all parties involved being
aware of the tampering.</p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman","serif""><strong>Non-Repudiation:</strong><b><br>
</b>The sender cannot deny sending the message or transaction, and the receiver
cannot deny receiving it.</p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman","serif""><strong>Access Control:</strong><b><br>
</b>Access to the protected information is only realized by the intended person
or entity.</p>
<h1 style="margin-left:0.5in;margin-right:0in;font-size:24pt;font-family:"Times New Roman","serif";font-weight:bold"><span style="font-size:12pt"><span>2.<span style="font:7pt "Times New Roman""> </span></span></span><span style="font-size:12pt">Digital Signature<span></span></span></h1>
<h1 style="margin-right:0in;margin-left:0in;font-size:24pt;font-family:"Times New Roman","serif";font-weight:bold"><span style="font-size:12pt;font-weight:normal">Digital
Signature is a process that guarantees that the contents of a message have not
been altered in transit.</span><span style="font-size:12pt"> </span><span style="font-size:12pt;font-weight:normal">You need
a digital certificate to digitally sign a document. However, if you create and
use a self-signed certificate the recipients of your documents will not be able
to verify the authenticity of your digital signature. They will have to
manually trust your self-signed certificate. The policy should come with
legislation of implanting Public Key infrastructure in Kenya.<span></span></span></h1>
</span></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, Mar 15, 2019 at 8:15 AM Nanjira Sambuli via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Good day,<br>
Are we to assume that concerns raised here regarding today’s deadline for submitting comments have gone unheard? <br>
<br>
<br>
<br>
Regards, <br>
Nanjira.<br>
<br>
Sent on the move.<br>
<br>
> On 11 Mar 2019, at 19:18, <a href="mailto:info@elvisjonyo.co.ke" target="_blank">info@elvisjonyo.co.ke</a> wrote:<br>
> <br>
>> On 2019-03-11 13:51, Nanjira Sambuli via kictanet wrote:<br>
>> +1, Ali,<br>
>> Additionally, are there reflections on the successes and shortcomings<br>
>> for the 2013-17 period?<br>
>> For instance the goal on broadband speeds for rural vs urban areas, a<br>
>> very lofty goal therein?<br>
>> Regards,<br>
>> Nanjira.<br>
>> Sent on the move.<br>
>>> On 11 Mar 2019, at 07:29, Ali Hussein <<a href="mailto:ali@hussein.me.ke" target="_blank">ali@hussein.me.ke</a>> wrote:<br>
>>> Gimode<br>
>>> Greetings. Seeing that you posted this email on Friday, 8th March, I'm curious to understand how the committee can expect to get substantive responses within a week on such a critical piece of document?<br>
>>> I think it's time this country reviews what it means when the constitution talks about Public Participation. I know that there are members of the August House in this list. I challenge them to address this issue. I fear that government officials are taking us through a 'tick the box' exercise when it comes to public participation.<br>
>>> Ali Hussein<br>
>>> Principal<br>
>>> AHK & Associates<br>
>>> Tel: +254 713 601113<br>
>>> Twitter: @AliHKassim<br>
>>> Skype: abu-jomo<br>
>>> LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" rel="noreferrer" target="_blank">http://ke.linkedin.com/in/alihkassim</a><br>
>>> 13th Floor , Delta Towers, Oracle Wing,<br>
>>> Chiromo Road, Westlands,<br>
>>> Nairobi, Kenya.<br>
>>> Any information of a personal nature expressed in this email are purely mine and do not necessarily reflect the official positions of the organizations that I work with.<br>
>>>> On Fri, Mar 8, 2019 at 9:04 PM Gimode, Chiimbiru via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br>
>>>> Dear Listers,<br>
>>>> You will recall the Ministry of Information, Communications and Technology (MoICT) constituted an inter-agency Steering Committee to review of Kenya’s first National Broadband Strategy (NBS) for the period 2013-2017. The Committee draws membership from the MoICT, Communications Authority of Kenya (CA), Vision 2030 Delivery Secretariat (VDS), National Communications Secretariat (NCS) and the ICT Authority (ICTA).<br>
>>>> The team is at the tail-end of the review of the NBS and is seeking views from the members of the public to enrich the NBS for the period 2018 – 2023 in line with Constitution of Kenya 2010.<br>
>>>> Attached is a public notice on the same.<br>
>>>> You can access the consultation paper on the Authority’s website on this link: <a href="https://ca.go.ke/consumers/public-consultations/open-consultations/" rel="noreferrer" target="_blank">https://ca.go.ke/consumers/public-consultations/open-consultations/</a><br>
>>>> The deadline for submission of comments is 15th March 2019.<br>
>>>> Best Regards,<br>
>>>> Chiimbiru Gimode, CMRP, MPRSK.<br>
>>>> Communications Officer<br>
>>>> Communications Authority of Kenya (CA)<br>
>>>> Head Office: CA Centre,Waiyaki Way,Westlands, Nairobi I P.O Box 14448 Nairobi 00800.<br>
>>>> Regional Offices: Mombasa I Nyeri I Kisumu I Eldoret<br>
>>>> Office Line : 0703-042-524 I Website : <a href="http://www.ca.go.ke" rel="noreferrer" target="_blank">www.ca.go.ke</a> I Twitter : @CA_Kenya<br>
>>>> Facebook : Communications Authority of Kenya I YouTube : CA Kenya I Instagram: CA Kenya<br>
>>>> Flickr : <a href="https://www.flickr.com/photos/cck-kenya" rel="noreferrer" target="_blank">https://www.flickr.com/photos/cck-kenya</a><br>
>>>> Core Values:<br>
>>>> Integrity | Innovation| Excellence<br>
>>>> “Today is only one day in all the days that will ever be. But what will happen in all the other days that ever come can depend on what you do today’’-Ernest Hemingway<br>
>>>> Please be responsible, consider the environment before printing this e-mail.<br>
>>>> DISCLAIMER:- This email and any files transmitted with it are confidential and intended solely for the use by the individual(s) or entity to whom it is addressed to. If you are not the intended recipient, you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. Additionally, if you have received this email in error please notify the sender immediately by a reply e-mail. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message, which arise as a result of e-mail transmission.<br>
>>>> _______________________________________________<br>
>>>> kictanet mailing list<br>
>>>> <a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
>>>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
>>>> Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
>>>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
>>>> Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com</a><br>
>>>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
>>>> KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
>> _______________________________________________<br>
>> kictanet mailing list<br>
>> <a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
>> <a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
>> Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
>> Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
>> Unsubscribe or change your options at<br>
>> <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/info%40elvisjonyo.co.ke" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/info%40elvisjonyo.co.ke</a><br>
>> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder<br>
>> platform for people and institutions interested and involved in ICT<br>
>> policy and regulation. The network aims to act as a catalyst for<br>
>> reform in the ICT sector in support of the national aim of ICT enabled<br>
>> growth and development.<br>
>> KICTANetiquette : Adhere to the same standards of acceptable behaviors<br>
>> online that you follow in real life: respect people's times and<br>
>> bandwidth, share knowledge, don't flame or abuse or personalize,<br>
>> respect privacy, do not spam, do not market your wares or<br>
>> qualifications.<br>
> It is unreasonable and dishonorable to expect the public to peruse through a document and give comments in one week. You might as well promulgate it as is.<br>
> <br>
> <br>
<br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/njiraini2001%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/njiraini2001%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div>