KICTANet
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
November 2007
- 37 participants
- 80 discussions
16 Nov '07
Begin forwarded message:
> From: "Wairagala Wakabi" <wakabi(a)cipesa.org>
> Date: 15 November 2007 12:17:57 GMT+03:00
> To: fibre-for-africa(a)lists.apc.org
> Subject: [Fibre-for-africa] Fwd: [APC-IGF] Notes on Access Plenary
> Reply-To: APC - Private list for use by EASSY Workshop Participants
> <fibre-for-africa(a)lists.apc.org>
>
> --------------------------- Original Message
> ----------------------------
> Subject: [APC-IGF] Notes on Access Plenary
> From: "Abi Jagun" <abi(a)apc.org>
> Date: Wed, November 14, 2007 9:46 pm
> To: "Private work space for APC members, staff and partners
> participating in the IGF" <apc-igf(a)lists.apc.org>
> ----------------------------------------------------------------------
> ----
>
> The panel was chaired by Helio Costa [Minister of Communications,
> Brazil] and Markus Kummer [Executive Coordinator, IGF]; and was
> moderated by Richard Sambrook [Director of the BBC's Global News
> division].
>
> Panellists were: Mike Jensen [Independent consultant/APC], Roque
> Gagliano [ANTEL/NAPLA/ALAC], Valerie D'Costa [InfoDev], Sylvia Cadena
> [WILAC.net] Mouhamet Diop [Next.sn], Anita Gurumurthy [ITforChange],
> and Jacquelynn Ruff [Verizon].
>
> Discussants were: Maui Sanford, Rajesh Bansal, Hökmark Gunnar, Sam
> Paltridge, and Radhika Lal [UNDP].
>
>
> The moderator asked that the discussions of the panel be framed in
> light of the following two considerations: (i) the characteristics of
> the next billion people to be connected to the Internet - "How do they
> differ from those who are already connected … Who are they and what is
> needed in order to bring them online?; and (ii) issue emanating from
> the demand side as well as from the traditional supply side. Issues
> arising from the supply perspective include - regulation, law, policy,
> competition, capacity building etc. Whilst demand side considerations
> include issues of cost, ease of use, relevance of content, access for
> the elderly and those with disabilities, questions of language, and
> the crucial link between access and development.
>
>
> Key issues and/or suggestions that emerged from the Access Panel
> are as
> follows:
>
> 1. There was recognition that availability of Internet infrastructure
> must be considered hand-in-hand with the affordability of the
> infrastructure.
>
> 2. There was recognition that more concrete efforts at building demand
> for the Internet are required and an important aspect of this is the
> availability of content and affordability of access. To facilitate
> this, it was suggested that local content and traffic should be "kept"
> (in terms of hosting and transmission) at the local level. This is
> because "Internet transit cost[a] is one of the main problems for
> developing countries" (Gagliano) and are usually borne (100%) by
> service providers/operators in the developing countries. With this in
> mind, it was suggested that greater support (in terms of regulation
> and backbone infrastructure) be given to the establishment and
> sustainability of Internet Exchange Points (IXPs) at both national and
> regional levels.
>
> 3. With respect to high transit costs, the need for developing
> countries/regions to take advantage of the "savings" that can be made
> by adopting a regional policy of interconnected IXPs and thereby
> "break through the transit model and … [usher in a] … peering model"
> (Diop).
>
> 4. It was also recognised that for affordable and universal access to
> be achieved, the competitive environment in developing nations needs
> to be developed. This requires that regulatory and policy regimes be
> improved – in particular the "long-term monopolies, duopolies or cosy
> cartels" (Jensen) that exist in the key areas of international
> gateways, backhaul/terrestrial networks and mobile sector need to be
> addressed. Other regulatory and policy areas that need to be looked
> into are interconnection, number portability, and the expansion and/or
> increase in diversity of organisations that are able to
> deliver/provide telecom services – these include community operators,
> municipal authorities, cooperatives etc.
>
> 5. There was recognition that improvements in international and
> national fibre optic network require new models for deployment. It
> was suggested that backhaul networks be viewed as a public good (in
> much the same way as roads are) and that in this respect their
> deployment be coordinated with other infrastructure projects – such as
> new road, rail, electricity, gas pipelines etc. The position can also
> be taken that "…development finance for these types of infrastructure
> projects should be conditional on including fibre in their
> deployment." (Jensen)
>
> 6. In considering the suggested need for greater coordination in the
> deployment of fibre in new infrastructure projects; it was highlighted
> that priority should be given to energy infrastructure and in
> particular electrification projects.
>
> 7. Reviewing regulatory and policy regimes, and achieving greater
> coordination in the deployment of infrastructure (amongst others)
> requires that the capacity of regulators be built up significantly ...
>
> 8. In order to improve and achieve more informed policy- and
> decision-making, the need to rethink indicators used for measuring
> progress/performance was highlighted. Those that are currently
> collated and used are often characterised by a significant time lag
> (sometimes of up to two to three years) which negatively impacts on
> the reliability and realism of decisions on which they are based. It
> was therefore suggested that more up-to-date Internet metrics - such
> as autonomous system numbers, domain names, Internet protocol
> addresses etc. – be incorporated into the repertoire of (global)
> telecom/Internet metrics.
>
> 9. There was recognition of the tremendous strides that have been made
> by mobile and wireless technologies in enabling developing country
> populations to gain access communication services. It was recognised
> that the mobile phone has been instrumental in this success and
> suggested that this technology, and the many initiatives that have
> adapted its use at the local/"grass root" level be considered for
> inclusion in future connectivity/access plans. This would suggest
> that such "community-based" initiatives be considered at par with
> telco-led roll-out plans – especially with reference to rural areas
> and marginalised/under-served communities; and where funding provision
> exists for universal service.
>
> 10. It was recognised that adopting a more "demand side" perspective
> to the access problem/issue calls for a better understanding of the
> needs of users – and in particular the needs of "the next billion" to
> be connected. It was felt that an understanding and articulation of
> "what the critical Internet use issues[b] are in underserved
> communities" (D'Costa) will help to better identify the relevance of
> telecoms and ICT to development, and in initiating access solutions
> that better serve these communities.
>
> 11. Recognising the needs of users – especially those in rural
> communities, highlights the importance of translating and promoting
> local languages and local customs as this facilitates the use of
> communications networks by these communities. An appreciation of the
> culture and incorporation of local languages also helps to promote and
> develop the skills of the members of the community in using the
> networks and in adapting them to their needs. This can significantly
> improve the sustainability and continuity of the network (Cadena).
>
> 12. In developing countries; rural areas can no longer be treated as
> the exception: "when in truth [in cited specific instance] more than
> 70% of the population lives in rural areas" (Cadena). It was
> therefore recognised that some reform/modification of regulation and
> policy is required to facilitate the implementation of access
> solutions in these areas. Specific areas highlighted include the
> removal of charges and/or duties applied to new technologies that are
> particularly suited to such areas.
>
> 13. Also with respect to rural and remote areas, it was suggested that
> certain services - such as communication during emergencies and
> disasters, should be provided as a public good (and considered more
> important than any economic interest).
>
> 14. There was the recognition that access is more than connectivity
> and that the tools used in connecting to the Internet – in particular
> their adaptation and adequacy of use –are also important. The need
> for capacity building around technological development and adaptation
> that would ensure that connectivity tools are "fit for use".
>
> 15. It was highlighted that when it comes to providing access to poor
> communities: "the most meaningful ICT models … are not just about
> creating demand loops for individual users to pay, but models that
> address systemic and institutional change through ICTs" (Gurumurthy).
> It was suggested that Telecoms/ICTs can and should therefore be
> embedded within social development initiatives and in these
> circumstances be delivered as a public good. It was emphasised that a
> "public goods approach to ICT" does not negate the need and relevance
> of market-orientated approaches to Internet access; rather each
> approach has its own area of application.
>
> 16. It was noted that access, from the perspective of the deployment
> of infrastructure, is capital intensive and that capital available for
> investments in infrastructure is international in nature. This
> emphasises the capacity developing countries must have in attracting
> investment/capital. Areas that facilitate attractiveness for
> investment were identified as including transparent and stable
> regulatory environment; respect for the rule of law; openness to
> foreign investment; a commitment to encouraging competition; good
> licensing and spectrum allocation procedures, a flexibility for
> innovative services etc.
>
>
> [a] This relates to the cost of accessing Internet ports that are
> generally located outside developing countries and also the cost of
> transmission to and from these ports all of which are borne (100%) by
> the service provider in the developing country.
>
> [b] Examples of these include how such use substitutes for a two or
> three day journey to the nearest town. How it can help a citizen
> better engage more effectively with a local or their municipal
> authority. How it can help a small business to expand its market
> reach, or its distribution network. How it can help new entertainment
> and information possibilities open up to those citizens. (D'Costa)
> _______________________________________________
> Apc-igf mailing list
> Apc-igf(a)lists.apc.org
> http://mailman-new.greennet.org.uk/mailman/listinfo/apc-igf
>
>
>
> _______________________________________________
> Fibre-for-africa mailing list
> Fibre-for-africa(a)lists.apc.org
> http://lists.apc.org/cgi-bin/mailman/listinfo/fibre-for-africa
>
Eric M.K Osiakwan
Executive Secretary
AfrISPA (www.afrispa.org)
Tel: + 233.21.258800 ext 2031
Fax: + 233.21.258811
Cell: + 233.244.386792
Handle: eosiakwan
Snail Mail: Pmb 208, Accra-North
Office: BusyInternet - 42 Ring Road Central, Accra-North
Blog: http://blogs.law.harvard.edu/eric/
Slang: "Tomorrow Now"
1
0
AFNOG & AFRINIC JOINT ANNOUNCEMENT, MAY/JUNE 2008
9th AfNOG MEETING
AfriNIC-8 MEETING
The African Network Operators' Group (AfNOG) and the African Network
Information Centre (AfriNIC) are pleased to announce that the 9th AfNOG
Meeting and the AfriNIC-8 Meeting will be held Rabat, Morocco,
in May /June 2008.
ABOUT THE ENTIRE EVENT
AfNOG and AfriNIC are jointly organising a two-week event
that includes the AfNOG Workshop on Network Technology
(offering advanced training in a week-long hands-on workshop),
several full-day Advanced Tutorials, a one-day AfNOG Meeting,
and a two-day AfriNIC Public Policy Meeting and Annual General Meeting.
In addition, several side meetings and workshops will be hosted
in collaboration with other organizations such as the AAU and ISOC.
Further information about the event may be found at
<http://www.afnog.org/afnog2008/> and <http://www.afrinic.net/meeting/>.
TIMETABLE
Unix Boot Camp 24 - 25 May 2008 (Saturday - Sunday)
AfNOG Workshop 26 - 30 May 2008 (Monday - Friday)
AfriNIC IPV6 W/shop 31 May - 1 June 2008 (Saturday - Sunday)
AfREN Meeting 31 May - 1 June 2008 (Saturday - Sunday)
AfNOG Tutorials 1 - 2 June 2008 (Sunday - Monday)
AfriNIC LIR W/shop 2 June 2008 (Monday)
AfNOG Meeting 3 June 2008 (Tuesday)
AfriNIC-8 Meeting 4 - 5 June 2008 (Wednesday - Thursday)
Africa INET Day 6 June 2008 (Friday)
VENUE
The Workshop, Tutorials, AfREN Forum, IPv6, LIR (24 May - 2nd June
2008)
will be held at Mohammadia Engineering Institute, Rabat. All
Conferences (3 - 6 June 2008) will be held at the Golden Tulip Farah,
Rabat, Morocco.
ABOUT AfNOG
AfNOG (see <http://www.afnog.org/>) is a forum for cooperation
and the exchange of technical information between operators of
Internet-connected networks in Africa. AfNOG has organised
an event like this one every year since 2000.
ABOUT AFRINIC
AfriNIC (see <http://www.afrinic.net/>) is a Regional Internet
Registry (RIR), responsible for Internet resources Mangement in
Africa region. AfriNIc organises two Public Policy meetings every
year (see <http://www.afrinic.net/meeting/>).
AfNOG WORKSHOP ON NETWORK TECHNOLOGY
The AfNOG Workshop on Network Technology aims to offer advanced
training to people who are in the process of developing and
enhancing an Internet-connected network with regional and
international connectivity. The target audience includes senior and
mid-level technical staff of commercial Internet service providers
(ISPs), academic networks, government networks, or NGO networks.
This workshop builds on the experience of previous AfNOG workshops
held annually from 2000 to 2007 in eight different African countries,
and also the Internet Society's INET workshops, held annually from
1993 to 2000 at eight locations around the world. The workshop's
instructors are an international team with many years of experience
operating large networks and teaching about network operations.
The workshop is divided into four parallel tracks:
SA-E - Unix System Administration (in English), focused on
using a Unix-like operating system as a platform for
delivery of Internet services.
SS-E - Scalable Internet Services (in English), focused
on the design and operation of email, web, and other
Internet services, in ways that can scale to handle
large numbers of end users.
SI-E - Scalable Network Infrastructure (in English), focused
on the design and operation of networks using routers
and switches, in ways that can scale to handle large
numbers of interconnected sites.
SI-F - Infrastructure Reseaux IP (en francais),
similar to SI-E, but given in French.
Further information and online application form for the workshop can be
found at <http://www.afnog.org/afnog2008/workshop/online_application.html>
AfREN MEETING
The Africa Research and Education Networking community will be
holding a two-day meeting on 31 May and 1 June 2008. The meeting will
discuss issues of interest to the NREN community such as coordination on
activites in the region, advocacy, bandwidth consortia, regional RENs
etc
AfNOG TUTORIALS
AfNOG will offer 1 to 2 full-day(s) tutorials on advanced topics.
Tutorials take place in a classroom-style environment, and
may include a hands-on practical component. Tutorials are
non-commercial in nature, and most are technically oriented. They
are intended to offer advanced training on technology already
deployed or soon to be deployed on networking and related services
provisioning for ISP operations.
9th AfNOG MEETING
The 9th AfNOG meeting will be held in Rabat, Morocco, on
3 June 2008. AfNOG conferences provide a forum for the
coordination and dissemination of technical information related
to backbone/enterprise networking technologies and operational
practices. The meetings are informal, with an emphasis on relevance
to current and future African backbone engineering practices.
The AfNOG 2007 conference in Abuja, Nigeria, drew over 165
participants, mainly consisting of network engineering staff
from national service providers, and members of the research and
education community.
People interested in making a presentation or chairing
a panel discussion at the AfNOG meeting are invited to
to submit a proposal, following the instructions at
<http://www.afnog.org/afnog2008/conference/>
AfRINIC-8 MEETING
The AfriNIC-8 meeting will be held in Rabat, Morocco, on 4 and
5 June 2008. AfriNIC Meetings are open to everyone and provide an
excellent opportunity to take part in Internet policy discussions.
These policies, which describe how Internet Number Resources should be
managed and distributed, are developed by the community.
The meeting will include tutorials, presentations, update on the various
working groups and the AfriNIC Public Policy Meeting. The two day
meeting
will be preceeded by a two-day IPv6 training. The meeting will focus on
the IPv6 protocol and its deployment, especially in Africa and the issue
of the exhaustion of the IPv4 pool of address space. There will be an
opportunity to discuss the challenges which our region will be facing
with
the exhaustion.
Further information is available at <http://www.afrinic.net/meeting/>.
ISOC - INET AfRICA MEETING
The Internet Society will be organizing an INET Africa Conference on
6 June 2008 in conjunction with the AfriNIC 8 and AfNOG 9 meetings in
Rabat, Morocco. This meeting will focus on technical as well as policy
aspects surrounding Internet standards development and applications,
with special attention on localisation and education initiatives, and
efforts to further internationalise the Internet. The meeting is also
expected to open discussion on Internet governance issues of importance
to the continent.
Issued jointly by AfNOG and AfriNIC
------
AfNOG 2008 WORKSHOP ON NETWORK TECHNOLOGY - APPLICATION FOR ADMISSION
Please see <http://www.afnog.org/afnog2008/workshop/> for
information about the AfNOG 2008 Workshop on Network Technology.
If you have questions regarding this announcement and application, they
may be addressed to: <workshopinfo08(a)afnog.org>
WHERE TO APPLY
- You can fill in an application on line, at
<http://www.afnog.org/afnog2008/workshop/online_application.html>
- You can download a copy of the application form from
<http://www.afnog.org/afnog2008/workshop/application-form.txt>, or
request a copy via email to <applications08(a)afnog.org>.
Then fill it in off-line, and email it to
<workshop-apply08(a)afnog.org>.
The "Subject" line of the message should contain your surname or
family name in the following format:
Subject: AfNOG Workshop Application: <your-family-name>
WHEN TO APPLY
Application forms must be submitted no later than 7 December 2007.
Applicants will be notified of their acceptance to the program
and the amount of financial aid available (if any) on or about 31st
January 2008.
INFORMATION TO BE INCLUDED ON YOUR APPLICATION
Please ensure that all of the contact information you submit is and
accurate, or we will not be able to contact you.
Please give detailed answers to the questions about your work and
your experience.
If your are applying for financial assistance from AfNOG, please
do not forget to answer the questions about other funding sources
available to you.
A. PERSONAL DATA
FAMILY NAME (LAST NAME, SURNAME) ONLY:
Full Name:
Employer/Organization
Position/Title:
Business Address:
Business Telephone:
Alternate Telephone:
E-mail address:
Fax:
Date of birth:
Nationality:
Name as it appears on passport or other travel document:
Passport number:
Country issuing passport:
Date passport was issued:
Date of passport expiration:
Knowledge of English /French: Please rate your knowledge in these
categories:
Listening/comprehension: minimal / fair / good / excellent
Reading: minimal / fair / good / excellent
Speaking: minimal / fair / good / excellent
Writing: minimal / fair / good / excellent
Please indicate with an asterisk (*) the most reliable addresses and
telephone/fax numbers above which can be used to reach you.
B. COURSE OF INSTRUCTION
Instructional track applied for (Please select only one track; the tracks
will run concurrently):
[ ] SA-E - UNIX SYSTEM ADMINISTRATION
[ ] SS-E- SCALABLE INTERNET SERVICES
[ ] SI-E - SCALABLE NETWORK INFRASTRUCTURE
[ ] SI-F - INFRASTRUCTURE RESEAUX (French Track - equivanent to SI-E)
Please indicate your specific interests within the area you have chosen:
C. TECHNICAL SKILLS
1. Are you a UNIX user? How much have you used it?
2. Have you been a UNIX system administrator? Describe your experience
(length of time, versions, etc.).
3 Have you used/administered TCP/IP networks? Describe.
4. Have you set up and/or administered any of the following?
Please give details.
- bind or any other nameservers
- sendmail/smail/exim/postfix
- majordomo/mailman or other list manager
- apache/IIS web systems
5. Have you configured or otherwise managed any of the following?
Details, please.
- routers
- switches
- network monitoring
- noc
D. DESCRIPTION OF ROLE IN NATIONAL NETWORKING ACTIVITIES
Bearing in mind that this information will be used to determine whether
to admit you to the workshop, please provide in the format of your
choice the following information about yourself. Please be sure that it
is sufficiently clear, well organized and adequate for this purpose.
1. A description of your current employer, your position, your duties
and responsibilities, and how they relate to current and future data
networking activities in your country.
2. A brief description of your computing and networking environment
(operating systems, networking software, modems, etc.), including the
connectivity of your organization to the Internet and your country's
connectivity to the international Internet.
3a. Scope of your institution (check all categories that apply):
[ ] Commercial Network Provider
[ ] Academic Network Provider
[ ] NGO Network Provider
[ ] Other (Specify)______________
3b. Approximate number of full time staff at your institution:________
4. How your training and current work prepare and qualify you for the
track you wish to attend.
5. How you expect to use the knowledge you gain at the workshop after
you return to your country.
6. If you have previously attended AfNOG/INET Workshops for Developing
Countries,
a. Year and track you attended:
b. A precise description of how you have used the training you have
received in the past:
c. The significant advances in networking which have occurred in your
country specifically because of your knowledge and effort:
E. FINANCIAL INFORMATION
Your application must contain the following complete information if you
wish to be considered for financial support to attend the workshop.
The Workshop fee is US$1,600. This includes accommodation and meals.
Applicants are usually expected to provide their own funding (from
whatever sources). However AfNOG or its sponsors may make a limited
financial assistance available to deserving candidates. Even if you
request financial assistance you might not receive any, and your
acceptance into the Workshop will be conditional on your ability to
provide all or most of the funding yourself. Although you may be well
qualified and in great need of financial assistance, the maximum funds
AfNOG or its sponsors may provide is US$1,000 in financial assistance
for BOTH WORKSHOP FEES AND AIRFARE.
Payment for the workshop may be made by funds transfer, bank / certified
cheque or in cash. Further details will be provided in the admission
letter to successful candidates.
NOTE : YOUR ACCEPTANCE INTO THE WORKSHOP MAY BEPEND ON YOUR ABILITY TO
PROVIDE
SOME OR ALL THE WORKSHOP FEES.
1. Are you are requesting financial aid from the AfNOG Workshop for
attending the workshop and meetings?
[ ] Yes
[ ] No
2. If you are requesting financial aid to cover the workshop fee, please
provide a complete list of funding sources in the following form. The
list should contain all sources of funds that are available to you for
payment of the workshop fee. The amounts should total U.S.$1,600.
1. Your Institution -- U.S.$ __________
2. Your Government -- U.S.$ __________
3. From international organizations -- U.S.$ __________
4. Your personal contribution -- U.S.$ __________
5. Amount you ask from AfNOG -- U.S.$ __________ (less than $1,000)
_________________________________
TOTAL Income = U.S.$1,600.00
(PLEASE SELECT ONLY ONE - WORKSHOP FEES OR AIRFARE)
3. Will you need financial assistance for airfare? If so, how much will
you or your institution be contributing?
[ ] No, assistance for airfare not needed.
[ ] Yes, assistance needed. (less than $1,000)
Amount of your contribution: U.S.$_________
4. If you are requesting financial support for airfare, please provide a
good estimate of round trip, lowest economy excursion airfare
between your place of residence and Cassablanca, Morocco, in May 2008.
(Flights from Africa terminate at Cassablanca, connection to Rabat can
be made by bus or train).
1. Airfare:
2. Airline:
3. Type of fare:
4. City of departure:
5. Source of your estimate:
Signature (your name as you would sign it): __________________________
Date:___________________
_______________________________________________
afnog mailing list
http://afnog.org/mailman/listinfo/afnog
1
0
Apologies for cross-posting.
Harry
_____
From: ke-internetusers-bounces(a)bdix.net
[mailto:ke-internetusers-bounces@bdix.net] On Behalf Of robert yawe
Sent: Monday, November 12, 2007 11:37 PM
To: Internet user group
Subject: [ke-internetusers] ICT Board's accreditation of BPO Society
This morning I attended a breakfast meeting hosted by the newly appointed
ICT Board but which turned out to be a flag waving event for some private
club called the BPO Society.
It is interesting what happens when you pick private sector people and give
them the mandate to run a public institution. Last time I checked single
sourcing for government services can only be done after requesting exemption
from the Ministry of Finance, but I stand corrected.
The ICT Board has unilaterally appointed the BPO Society as the only bona
fide forwarder of licensing applications for any BPO business, under which
gazette notice was this status issued? It is interesting how a state agency
can send me to pay a private club (Kes. 35,000/-) for them to forward my
application to set up a business. Even at the height of bureaucracy
institutions like the Chamber of Commerce never had such powers, so where
does the ICT Board get the authority to single source for a vetting agency?
The answer to the whole issue came out in a subtle manner on one of the
slides US$ 11.4 Million (Kes. 0.75 Billion) for capacity building of the BPO
industry. Somebody seriously needs to monitor this new private sector dream
teams.
This are the acts that stifle young industries, I think to grow the BPO
business in this country we need to have the government look the other way
to let entrepreneurs do what they have to do like the council did with the
issue of private garbage collectors and CCK with courier service providers.
Let legislation follow ingenuity & creativity, the other way just doesn't
work.
Robert Yawe
_____
Yahoo! Answers - Get better answers from someone who knows. Try
<http://uk.answers.yahoo.com/;_ylc=X3oDMTEydmViNG02BF9TAzIxMTQ3MTcxOTAEc2VjA
21haWwEc2xrA3RhZ2xpbmU> it now.
3
2
[Folks, incidentally migration to IPv6 from IPv4 is much emphasized at
the internet Governance Forum (or IGF) meetings ending today here at
Rio de Janeiro, Brazil - and I have taken very good note of the
consequences of NOT migrating. Various Kenyans here assembled a team
put up quite an impressive "Best Practices on multi-stakeholders
participation". GoK, CCK, KENET, KIXP, KICTAnet presentations received
accolades:) Thanks KeNIC for excellent read below-- AlexG]
---
<http://www.bdafrica.com/index.php?option=com_content&task=view&id=4286&Item…>
[Business Daily]
Internet growth calls for address migration
Written by Beatrice Gachenge
November 14, 2007:
<snip>
With the advent of more dynamic technology gadgets, more hosts are
encroaching into the Internet, leading to the fast depletion of
Internet protocol addresses commonly known as IP address. It was
bound to happen, but not as expected.
Who would have thought in the early 1980s that a mobile phone or a
camera phone would be connected to the Internet ? How about
refrigerators, and motor vehicles?
Now, one of the latest gizmos connected to the net is an umbrella,
that has Google Earth navigation on it. And the experiments are
getting weirder and wilder by the day!
The current protocol in utility today is known as IPV4 that has run
the Internet for more than 20 years. Over the years it has started
showing its limit mainly with the running out of number identifiers
associated to it, known as IP addresses.
IP addresses are used to route traffic on the Internet and can be seen
as the backbone of the Internet and they are used to identify hosts
that are connected to the Internet.
Vincent Ngundi, acting administrative manager of Kenya Network
Information Centre, says that with the Internet becoming part of
everyday life, more people are aggressively using it and most business
processes have now been converted into online applications....
<snip>
1
0
The 4th telecentres leaders forum organized by Ugabytes initiative in Uganda saw up to six countries being represented across the board being Uganda, Kenya Tanania,Rwanda,Burundi and Sudan. We were privileged on the last day to have the presence of the minister for Communication in Uganda Honorable Alintuma Nsambu.
The workshop being facilitated by Mr.Loic who is an expert on Social Entrepreneurship from an organization called Nesst brought out the topic of social enterprise more practical than said. What was noted all through the forum was that Digital Villages(telecentres) need to adopt new strategies and innovativeness for self reliance that reaches out to the community yet at the same time catalyze development through social enterprise within the community members. Before telecentres embark into social entrepreneurship, what is encouraged is to carry out a need assessment so that the project can be embraced by the community.
To make a digital village be self reliant and non dependent on donars,the following needs to be carried out to ensure success.
1) The Digital Village(Telecentre) needs to have a clear Mission
2) Have a healthy relation with the key players being the community running up the ladder to its partners and friends of the organization.
3) Have committed constituents.
4) Ability to adopt new trends and be flexible
5) Have a strong leadership.
6) Enable legal political and social environment
7) Accountability is key
8) Have sufficient financial resources
9) Have valuable and useful results or impact
10) Have effective high quality or work program.
The Honorable Minister Nsambu pointed out that his government is behind every effort to support digital Villages as he introduced a new computer that is being produced that uses Solar energy.
This is Jose' Njuki-Imwe Ngunjiri Reporting.
---------------------------------
Get easy, one-click access to your favorites. Make Yahoo! your homepage.
1
0
Begin forwarded message:
> From: "Wairagala Wakabi" <wakabi(a)cipesa.org>
> Date: 14 November 2007 10:56:10 GMT+03:00
> To: "African Information Society Initiative - Discussion Forum"
> <aisi-l(a)lyris.bellanet.org>
> Cc: discuss(a)afrispa.org, "Eric Osiakwan" <eric(a)afrispa.org>,
> gispa(a)yahoogroups.com, africann(a)afrinic.net, "African Information
> Society Initiative - Discussion Forum" <aisi-l(a)lyris.bellanet.org>,
> "Ghana Information Networking and Knowledge Sharing"
> <ginks(a)dgroups.org>, afnog(a)afnog.org, "KICTAnet ICT Policy
> Discussions" <kictanet(a)lists.kictanet.or.ke>, afrinic-
> discuss(a)afrinic.net
> Subject: [aisi-l] SEACOM gets funding boost
> Reply-To: "African Information Society Initiative - Discussion
> Forum" <aisi-l(a)lyris.bellanet.org>
>
> Netters,
> Its backers are saying SEACOM will be the only new cable completed
> in time
> to give South Africa the bandwidth needed for the 2010 WC, with
> "actual
> production of the fibreoptic cable and undersea facilities"
> starting next
> week. SA's SNO, NEOTEL, has helped marshal capital from local
> financial
> heavyweights, enabling NEOTEL to be owned 50% by South Africans.
>
> Tut Tut...
>
> Wakabi
>
>
> Sea cable venture lands big investors
>
> By Lesley Stones, Business Day, November 14 2007
>
> AN UNDERSEA cable promising cheap bandwidth for Africa yesterday
> finally
> named its backers, signing up enough well-connected local investors to
> guarantee its landing rights in SA.
>
> Investment heavyweight Venfin is sinking $75m into the project,
> taking a
> 25% stake in the 15000km cable linking SA to India and Europe.
>
> Cyril Ramaphosa’s black investment house Shanduka is taking 12,5%,
> worth
> $37,5m. Another 12,5% goes to Convergence Partners, a group of black
> investors led by Andile Ngcaba, the chairman of Dimension Data
> Africa and
> a former director-general of the communications department. Nedbank
> Capital and Investec will provide financing for the $650m project.
>
> SA’s second network operator, Neotel, is pumping in a far more modest
> R20m, and using its telecoms licence to guarantee that the cable
> can dock
> in SA.
>
> The local ownership is sufficient to ensure that Seacom meets
> controversial new conditions being drawn up by Communications
> Minister Ivy
> Matsepe-Casaburri, dictating who can land a cable in SA. The
> minister is
> insisting that any cable must be majority owned by African
> investors to
> come ashore.
>
> South Africans hold 50% of Seacom, and that rises to 75% African
> ownership
> thanks to 25% held by the Aga Khan Fund for Economic Development’s
> Industrial Promotion Services, a development agency based in Kenya.
>
> The remaining 25% lies with New York’s Herakles Telecom, a development
> group that has invested $4bn in Africa.
>
> Neotel is investing only in the local landing station, but its
> licence to
> operate in SA conferred on it the right to land a cable, said MD Ajay
> Pandey.
>
> “Our understanding is that the country needs international
> capacity, and
> the way international cable landing protocols have been defined
> means we
> have the opportunity here.”
>
> Venfin CEO Jannie Durand said Neotel’s licence to land a cable in
> SA meant
> everything had been done “legally and correctly”. Venfin was backing
> Seacom for two reasons, he said: “We are hopefully going to make a
> lot of
> money out of it and SA needs more bandwidth. We want to bring SA
> affordable bandwidth to the rest of the world.”
>
> Although the cable will cost $650m, it would be partly funded by
> loans as
> well as equity, allowing Venfin to take 25% for less than the book
> value
> of the project, Durand said.
>
> Pandey believes Seacom will be the onlyThe actual production of the
> fibreoptic cable and undersea facilities will start next week.
>
> The consortium has already invested more than $10m in a marine
> survey and
> engineering of the cable. The actual production of the fibreoptic
> cable
> and undersea facilities will start next week.
>
> Seacom will connect Mtunzini in SA to Mumbai in India and
> Marseilles in
> France via Mozambique, Madagascar, Kenya and Tanzania by June 2009.
>
> Terrestrial links will be built to take its bandwidth to numerous
> other
> inland countries. Its capacity of 1,28 terabytes per second is 10
> times
> the capacity on the existing Sat-3 cable around Africa’s west coast.
>
> The consortium has promised that it will charge other voice and data
> carriers significantly less for its bandwidth than they pay to use
> Sat-3
> or satellite services, which should trigger a massive decrease in
> the cost
> of phone calls, internet access and data transmissions for African
> consumers and businesses.
>
> “Improved access for business and individuals in Africa to
> communications,
> broadband services and new technology offerings can improve lives
> and help
> grow the economies of our countries,” said Ngcaba, the chairman of
> Convergence Partners. “The linking of southern and east Africa with
> India
> and Europe is crucial for enhancing development and trade between
> these
> key regions.”
>
> gies that will deliver affordable broadband
>> services open to all. Leveraging existing internet access point as
>> hubs could be a very good starting point to build license-free
>> point-to-point, point-to-multipoint, mesh or even cellular networks
>> that will reach the masses in the villages. It will be nice when
>> someone leaves the town to visit relatives in the village and not
>> lost
>> connectivity to the wireless space because their provider does not
>> offer services yet in that area. Think of a cell phone with WIFI
>> capabilities that accesses paid networks in towns and free WIFI
>> access
>> at the village sector. So in town, you will use your paid
>> services, in
>> the village you will use the free WIFI access...how nice will that
>> be?
>>
>> Wilfred
>>
>>
>> ----- Message from eric(a)afrispa.org ---------
>> Date: Thu, 1 Nov 2007 09:33:30 +0300
>> From: Eric Osiakwan <eric(a)afrispa.org>
>> Reply-To: Discuss(a)afrispa.org
>> Subject: [AfrISPA.Discuss] Five Goals of Connect Africa
>> To: discuss(a)afrispa.org, KICTAnet ICT Policy Discussions
>> <kictanet(a)lists.kictanet.or.ke>, gispa(a)yahoogroups.com, Ghana
>> Information Networking and Knowledge Sharing <ginks(a)dgroups.org>, APC
>> - Private list for use by EASSY Workshop Participants
>> <Fibre-for-africa(a)lists.apc.org>, africann(a)afrinic.net,
>> afrinic-discuss(a)afrinic.net, afnog(a)afnog.org, African Information
>> Society Initiative - Discussion Forum <aisi-l(a)lyris.bellanet.org>
>>
>>
>>> Dear All,
>>>
>>> The Connect Africa Summit justed ended in Kigali with the following
>>> five major goals;
>>>
>>> Goal 1. Interconnect all African capitals with ICT Broadband
>>> infrastructure and strengthen connectivity to the rest of the
>>> world by
>>> 2012 as well as interconnect major African cities by 2015.
>>> Goal 2. Connect all African villages to broadband ICT services
>>> by 2012
>>> and implement shared access initiatives such as community tele-
>>> centres
>>> and village phones.
>>> Goal 3. Adopt key regulatory measures that promote affordable,
>>> widespread access to a full range of bradband ICT services,
>>> including
>>> technology and service neutral licensing/authorisation practises,
>>> allocating spectrum for multiple, competitive broadband wireless
>>> service providers, creating national internext exchange points
>>> (IXPs)
>>> and implementing competition in the provision of international
>>> internet connectivity.
>>> Goal 4. Support the development of a critical mass of ICT Skills
>>> required by the knowledge economy, notably through the
>>> estamishment of
>>> ICT Centres of Excellence network in each sub-region of Africa
>>> and ICT
>>> capacity-building and training centres in each country, with the
>>> aim
>>> of achieving a borad network of inter-linked physical and virtual
>>> centres, whiles ensuring coordination between academia and
>>> industry by
>>> 2015.
>>> Goal 5. Adopt a national e-strategy, including a cyber-security
>>> framework, and deploy at least one flagship e-government service as
>>> well as e-education, e-commerce and e-health services using
>>> accessible
>>> technologies in each country in Africa by 2012, with the aim of
>>> making
>>> multiple e-government and other e-services widely available by
>>> 2015.
>>>
>>> The African ICT Ministers have also shortlisted some projects under
>>> ARAPKE which would be implenented through Connect Africa @ http://
>>> www.itu.int/ITU-D/connect/africa/2007/bgdmaterial/flagship-11.html
>>>
>>> It is important that we all engage and ensure that these ICT
>>> goals are
>>> met by 2012 and the larger MDGS by 2015.
>>>
>>> Thank you and sorry for cross-posting.
>>>
>>> Eric M.K Osiakwan
>>> Executive Secretary
>>> AfrISPA (www.afrispa.org)
>>> Tel: + 233.21.258800 ext 2031
>>> Fax: + 233.21.258811
>>> Cell: + 233.244.386792
>>> Handle: eosiakwan
>>> Snail Mail: Pmb 208, Accra-North
>>> Office: BusyInternet - 42 Ring Road Central, Accra-North
>>> Blog: http://blogs.law.harvard.edu/eric/
>>> Slang: "Tomorrow Now"
>>
>>
>> ----- End message from eric(a)afrispa.org -----
>>
>>
>>
>> _______________________________________________
>> Fibre-for-africa mailing list
>> Fibre-for-africa(a)lists.apc.org
>> http://lists.apc.org/cgi-bin/mailman/listinfo/fibre-for-africa
>>
>
>
>
> ---
> You are currently subscribed to aisi-l as: [eric.osiakwan(a)netplux.com]
> To unsubscribe, forward this message to leave-aisi-
> l-40669L(a)lyris.bellanet.org
>
Eric M.K Osiakwan
Executive Secretary
AfrISPA (www.afrispa.org)
Tel: + 233.21.258800 ext 2031
Fax: + 233.21.258811
Cell: + 233.244.386792
Handle: eosiakwan
Snail Mail: Pmb 208, Accra-North
Office: BusyInternet - 42 Ring Road Central, Accra-North
Blog: http://blogs.law.harvard.edu/eric/
Slang: "Tomorrow Now"
1
0
Gear up to being nominated or nominate yourself for ICANN constituencies!!
by Rebecca Wanjiku 13 Nov '07
by Rebecca Wanjiku 13 Nov '07
13 Nov '07
Please apply! The Nom Com's 2008 website will be available soon, and
candidate recruitment is anticipated to begin in mid-December 2007.
Here is the breakdown of representatives from the region now:
Board: Njeri Rionge (June 2003 - November 2008)
GNSO: NONE as you can see here:
http://gnso.icann.org/council/members.shtml
CCNSO:
Victor Ciza - Burundi - Term ends Mar-09
Paulos B. Nyirenda – Malawi – T erm ends Mar-10
Mohamed El Bashir - Sudan - Term ends Mar-08
Nashwa Abdelbaki - Egyot Term ends 2010
ALAC:
Africa
Mohamed El Bashir 4 (Sudan)
Hawa Diakite4 (Mali)
Alice Wanjira-Munyua2 (Kenya)
2008 ICANN Nominating Committee Convenes in Los Angeles
7 November 2007
The 2008 ICANN Nominating Committee (Nom Com) has been convened and
met for the first time on 2-3 November, immediately following the 30th
International ICANN Public Meeting in Los Angeles, California.
Prior to the Los Angeles meeting, on 11 September 2007, the ICANN
Board appointed Hagen Hultzsch as Nom Com Chair. Hagen has selected
Wolfgang Kleinwaechter as Associate Chair. Due to the bylaws, George
Sadowsky, the previous Nom Com Chair will serve as an advisor to the
current Nom Com.
2008 Nom Com will select:
Two members of the ICANN Board of Directors
One member of the Council of the Generic Names Supporting Organization
(GNSO)
One member of the Council of the Country-Code Names Supporting
Organization (ccNSO)
Two members of the At Large Advisory Committee (ALAC) (European and
North American regions)
Those selected by the Nom Com will take their seats at the end of the
2008 ICANN Annual Meeting, 7 November 2008.
First tasks of the Committee were to begin work on procedures and a
timeline for activities during 2007-2008. The Nom Com's 2008 website
will be available soon, and candidate recruitment is anticipated to
begin in mid-December 2007.
The Nom Com intends to hold a workshop during the ICANN meeting in
Delhi, India to provide information about progress and process and
answer questions. The workshop will be webcast and remote access
provided. The date of the workshop will be confirmed once the Delhi
meeting schedule is finalized.
The following individuals have been appointed to the 2008 Nominating
Committee:
Hagen Hultzsch - Chair
Wolfgang Kleinwaechter - Associate Chair
George Sadowsky - Advisor to the Chair (as previous Chair of the Nom
Com)
Karen Banks - GNSO, Non-Commercial Users Constituency
Phil Davidson - Technical Liaison Group
Ute Decker - GNSO, Intellectual Property Constituency
Grant Forsyth - GNSO, Business Constituency (Large)
Matias Altamira Gigena - ALAC, Latin American and Caribbean
Hartmut Glaser - Address Supporting Organization
Caroline Greer - GNSO, Registry Constituency
Ole Jacobsen - Internet Engineering Task Force
Khaled Koubaa - ALAC, Africa
Bill Manning - Root Server System Advisory Committee (non-voting
liaison)
Desiree Miloshevic - ALAC, Europe
Ram Mohan - Security and Stability Advisory Committee (non-voting
liaison)
Ross Rader - ALAC, North America
Jose Luiz Rebeiro-Filho, Higher Education Representative
Greg Ruth - GNSO, Internet Service Providers Constituency
Waudo Siganga - GNSO, Business Constituency (Small)
Paul Stahura - GNSO, Registrars Constituency
Karaitiana Taiuru - ALAC, Asia Pacific
Christopher To - Country Code Names Supporting Organization
The Nominating Committee Review was published on 24 October 2007. The
review and 2008 Nom Com are independent activities. The Nom Com
website can be found at http://nomcom.icann.org. Further information
on the invitation for statements of interests in ICANN leadership
positions will be posted in the near future.
_______________________________________________
AfrICANN mailing list
AfrICANN(a)afrinic.net
https://lists.afrinic.net/mailman/listinfo.cgi/africann
--
becky
beckyit.blogspot.com
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
---------- Forwarded message ----------
From: Anne-Rachel Inné <annerachel(a)gmail.com>
Date: Nov 8, 2007 12:54 PM
Subject: [AfrICANN-discuss] Gear up to being nominated or nominate
yourself for ICANN constituencies!!
To: africann(a)afrinic.net
Please apply! The Nom Com's 2008 website will be available soon, and
candidate recruitment is anticipated to begin in mid-December 2007.
Here is the breakdown of representatives from the region now:
Board: Njeri Rionge (June 2003 - November 2008)
GNSO: NONE as you can see here: http://gnso.icann.org/council/members.shtml
CCNSO:
Victor Ciza - Burundi - Term ends Mar-09
Paulos B. Nyirenda – Malawi – T erm ends Mar-10
Mohamed El Bashir - Sudan - Term ends Mar-08
Nashwa Abdelbaki - Egyot Term ends 2010
ALAC:
Africa
Mohamed El Bashir 4 (Sudan)
Hawa Diakite4 (Mali)
Alice Wanjira-Munyua2 (Kenya)
2008 ICANN Nominating Committee Convenes in Los Angeles
7 November 2007
The 2008 ICANN Nominating Committee (Nom Com) has been convened and
met for the first time on 2-3 November, immediately following the 30th
International ICANN Public Meeting in Los Angeles, California.
Prior to the Los Angeles meeting, on 11 September 2007, the ICANN
Board appointed Hagen Hultzsch as Nom Com Chair. Hagen has selected
Wolfgang Kleinwaechter as Associate Chair. Due to the bylaws, George
Sadowsky, the previous Nom Com Chair will serve as an advisor to the
current Nom Com.
2008 Nom Com will select:
Two members of the ICANN Board of Directors
One member of the Council of the Generic Names Supporting Organization (GNSO)
One member of the Council of the Country-Code Names Supporting
Organization (ccNSO)
Two members of the At Large Advisory Committee (ALAC) (European and
North American regions)
Those selected by the Nom Com will take their seats at the end of the
2008 ICANN Annual Meeting, 7 November 2008.
First tasks of the Committee were to begin work on procedures and a
timeline for activities during 2007-2008. The Nom Com's 2008 website
will be available soon, and candidate recruitment is anticipated to
begin in mid-December 2007.
The Nom Com intends to hold a workshop during the ICANN meeting in
Delhi, India to provide information about progress and process and
answer questions. The workshop will be webcast and remote access
provided. The date of the workshop will be confirmed once the Delhi
meeting schedule is finalized.
The following individuals have been appointed to the 2008 Nominating Committee:
Hagen Hultzsch - Chair
Wolfgang Kleinwaechter - Associate Chair
George Sadowsky - Advisor to the Chair (as previous Chair of the Nom Com)
Karen Banks - GNSO, Non-Commercial Users Constituency
Phil Davidson - Technical Liaison Group
Ute Decker - GNSO, Intellectual Property Constituency
Grant Forsyth - GNSO, Business Constituency (Large)
Matias Altamira Gigena - ALAC, Latin American and Caribbean
Hartmut Glaser - Address Supporting Organization
Caroline Greer - GNSO, Registry Constituency
Ole Jacobsen - Internet Engineering Task Force
Khaled Koubaa - ALAC, Africa
Bill Manning - Root Server System Advisory Committee (non-voting liaison)
Desiree Miloshevic - ALAC, Europe
Ram Mohan - Security and Stability Advisory Committee (non-voting liaison)
Ross Rader - ALAC, North America
Jose Luiz Rebeiro-Filho, Higher Education Representative
Greg Ruth - GNSO, Internet Service Providers Constituency
Waudo Siganga - GNSO, Business Constituency (Small)
Paul Stahura - GNSO, Registrars Constituency
Karaitiana Taiuru - ALAC, Asia Pacific
Christopher To - Country Code Names Supporting Organization
The Nominating Committee Review was published on 24 October 2007. The
review and 2008 Nom Com are independent activities. The Nom Com
website can be found at http://nomcom.icann.org. Further information
on the invitation for statements of interests in ICANN leadership
positions will be posted in the near future.
_______________________________________________
AfrICANN mailing list
AfrICANN(a)afrinic.net
https://lists.afrinic.net/mailman/listinfo.cgi/africann
--
becky
beckyit.blogspot.com
2
1
RE: INVITATION TO KICTANETs INTRODUCTION
OF THE E-WASTE PROJECT IN KENYA
KICTANet is working with the Hewlett Packard, EMPA (Swiss Materials Science & Research Technology), the Global Digital solidarity Fund (DSF) on their new programme on the “Recycling of electronic waste” in Kenya. The project will assess the current conditions for electronic recycling in communities in Kenya. It also aims to explore how additional local jobs can be created in this sector as well as the development of a blueprint for a sustainable e-waste management system in Kenya in collaboration with other existing local recycling projects. Pursuant to this KICTANet is therefore inviting you an introduction meeting to be held on Wednesday November 21 at Jacaranda Hotel from 9.00a.m. to 12.30 p.m. The meeting is an opportunity for the international team from DSF, EMPA and the Kenya research team to introduce the project to a few relevant stakeholders involved and interested in E-waste in Kenya.
Please
confirm your attendance to Rebecca Wanjiku Evelyn Majale on 4453671/2 or email: rebeccawanjiku(a)yahoo.com or evelyne(a)kictanet.or.ke
Tel. 254 720 318 925
blog:http://beckyit.blogspot.com/
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
1
0
10 Nov '07
Marching to a different drum – Africa enters the age of mobile content
News Update concentrates all its coverage on what happens in Africa. But
this week we have to describe events elsewhere because as all too often
happens, key decisions that will affect the continent are happening
elsewhere. Unless something fairly radical happens in the next 12-18
months, the development of mobile content revenues on the continent will
be shaped by the “hand-me-down” attitudes and technologies of others.
Russell Southwood seeks to explain.
Last week saw two more salvoes fired in the war for mobile operating
systems. American advertising and search engine company Google launched
its Android operating system in partnership with the Open Handset
Alliance and 30 mobile phone makers and interested parties like
Qualcomm. But amongst the larger makers, it is working closely with no 2
player Samsung with whom it agreed a deal on mobile tools in January
2007. Google described Android as “all of the software to run a mobile
phone, but without the proprietary obstacles that have hindered mobile
innovation.”
Meanwhile the world’s largest mobile handset manufacturer (Nokia) agreed
with the world’s largest mobile phone operator (Vodafone) to launch an
integrated suite of Vodafone services combined with Nokia Ovi services
on a range of Nokia handsets. A number of these handsets will be
exclusive to Vodafone. By all accounts, it improves access to the Nokia
Music Store, although Vodafone has its own product, Omnifone
MusicStation. Vodafone looks set to take over Vodacom in the
not-too-distant future.
Meanwhile Symbian, which is already on 165 million handsets worldwide,
was dismissive of the Google offering. John Forsyth, Symbian said:”… a
mobile OS is a very specialised form of rocket science. It's not search
rocket science." However this has not prevented one-time computer
company Apple from showing it can deliver this kind of rocket science,
so why not Google? Whoever gains dominance in this market and whether
the approach is open or closed will affect how mobile content develops
in Africa.
And it is at this point two key issues coincide for those in Africa who
want to develop mobile content revenues. Everyone knows that the mobile
phone and not the computer is the continent’s device of choice but this
rather masks the considerable variation in phone operating systems, web
access availability and just plain old functionality. The average phone
on the street is at the bottom end of the range and is really only fit
for receiving SMS messages.
This brings us to the hoop-la surrounding the launch of the iPhone today
in the UK as I write. Leave aside the usual promotional hype and the
sight of members of Cult Apple waiting overnight to buy their treasured
object, this phone is different. From trying it on a recent US visit, it
has an easy-to-use functionality that with adaptation has much to
commend it in the African context. It’s intuitive and icon driven,
allowing a lower level of functional literacy for users. (However, the
iPhone will not be going to South Africa any time soon. See Telecoms
News – In Brief)
The barrier to this kind of device is cost and the discussion mirrors
similar ones held about palm computers for Africa. The iPhone launch
price in the UK is US$538 as it is being launched as a premium product
with a monthly plan costing US$70. But give it 2-3 years and it will be
down to $300 and be a mainstream product, not necessarily produced by
Apple. But secondhand prices in Africa may take it down closer to $100-150.
But even this lowered price will not breach the magic $100 level that
Nicolas Negroponte set himself and failed to reach for a low-cost
computer. Also the low price phones produced as part of the GSM
Association initiative are stripped back in terms of overall
functionality. But if Africa is to have access to web content on its
mobiles, then it needs a cheaper phone device that can access web
content with a screen that is bigger than two large postage stamps.
Also whilst Africa’s mobile companies engage in the data upgrade arms
race, little thought seems to have been given to battery life issues.
The iPhone may not have 3G but it has an 8 hour battery life compared to
the 3G compatible Nokia N95 which has only a 4 hour battery life. No-one
seems yet to have thought through the energy implications of even a
significant minority of Africans using 3G phones.
Now I can hear you saying that all of this is fantasy stuff for Africa.
But Vodacom in South Africa said in October 2007 that it had 139,000
HSDPA customers and 899,000 Vodafone Live! subscribers, the latter being
the content service it markets from what is likely to become its parent
company. It is also pioneering a mobile TV service to its 3G subscribers
in South Africa. Numbers are modest but growing. Ah yes, but South
Africa is different. Nevertheless jobs service in Kenya attracted 35,000
subscribers and other services elsewhere in Africa are attracting tens
of thousands of people.
With numbers on this scale, mobile phones are not just communications
devices but media. Certain types of advertisers will be very interested
in getting to the largely young demographic that uses these services.
The sums will not be spectacular but they will help to fuel further growth.
But the barriers to growth in mobile content revenues are significant.
Last year we sat in on a seminar with mobile phone companies drawn from
right across Africa. Every single person stressed how important content
development was to their company and how they had a member of staff
working on it. However, with few exceptions not one of them talked about
a successful mobile content service that they were actually operating.
Mobile companies were not set up to do content and the revenues are not
yet large enough to gain real traction with operational managers.
A number of mobile operators are owned by multinational owners who have
sought to introduce content bundles that have been developed in Europe
and the USA. But as one of the more honest managers for these companies
admitted, there is only really on the most optimistic view a 50-60% fit
with the African market. So there is a need for better and more
compelling local mobile content.
But this is where the complications start. The typical income split is
50% to the mobile operator, 10-20% to the mobile platform provider and
30-40% to the content provider. Anxious to drive up income from this
source, the mobile operators are seeking to take a bigger share of the
value in other countries. However, they need to be careful not to kill
the goose that might lay the golden egg. They could easily give more
generous deals as they benefit from the minutes these services add.
Ideally there needs to be a new service every 4 weeks in some African
country so that it’s possible to work out what works locally and the
optimum price.
Another difficulty is that mobile providers are insisting on exclusive
deals. For example, if you want to launch your mobile content service
with a particular mobile operator, you have to offer an exclusive deal
for one year or more. The mobile operators still see content as a
marketing device rather than revenue in its own right.
The walled garden approach is very like the early days of the Internet
where people like AOL tried to create their own content universe.
Understandably, the mobile operators would like to control the
development of content on their media and take a large part of the
rewards. Apple’s approach to iTunes illustrates how lucrative this
approach can be.
The difficulty is that for mobile content to thrive in Africa, it has to
be easier to get it to market and to as wider range of people as
possible. At the moment, mobile content creators may have to re-version
their services for as many as 3-5 different delivery platforms.
The discussion parallels those that were had in the early days in Africa
about interconnection between mobile operators. Many operators said they
would not connect to other operators because it would be easier to
retain subscribers and revenues if the stayed isolated. In the event,
interconnection meant almost all operators benefited from there being a
large and growing “critical mass” of users. The same would almost
certainly be true for mobile content and perhaps the time is ripe for
operators to talk to each other about how best to promote wider use of
content, rather than simply tending their own back gardens. African
Mobile Content Alliance anyone?
From Balancing Act
<mailbox:///C%7C/Users/IPM/AppData/Roaming/Thunderbird/Profiles/u11w6ixk.default/Mail/Local%20Folders/Inbox?number=856298414#top>
1
0
On MAURITIUS COMPUTER MISUSE AND CYBERCRIME ACT 2003 and MOROCCAN COPYRIGHT LAW
by Rebecca Wanjiku 09 Nov '07
by Rebecca Wanjiku 09 Nov '07
09 Nov '07
MAURITIUS COMPUTER MISUSE AND CYBERCRIME ACT 2003
Kelly O'Connell, Miami Attorney Email
Mauritius is an island located in the Atlantic near Southern Africa,
in the Indian Ocean, east of Madagascar. It was first explored by
Portuguese sailors in the early in the 16th century. Later it was
controlled by the Dutch, French, and British until independence was
achieved in 1968. Given its inherent limitations of history, location,
and natural resources, the country has developed into an unmitigated
success, by anyone's standard.
The Government carefully assembled the infrastructure for a large,
state-of-the-art cyber complex in the early 2000's which should prove
attractive to any company wishing for access to the Asian continent
within a business-friendly and highly modernized infrastructure. This
law is an attempt to protect any foreign or local businesses setting
up shop there.
To better understand the Computer Misuse and Cybercrime Act 2003; Act
No. 22 of 2003; Offense, found in Part II, these questions will be
answered: What is "Unauthorized Access to Computer Data"? What is
"Access with Intent to Commit Offences," or "Unauthorized Password
Disclosure"? What is "Unauthorized Access to and Interception of
Computer Service"? What is "Unauthorized Modification of Computer
Material", or "Damaging or Denying Access to Computer System"? What is
"Unlawful Possession of Devices and Data" or "Electronic Fraud"?
Mauritius island state has staged an impressive economic evolution,
based upon its stable democracy, featuring a British system of regular
free elections and a positive human rights record, as the markets
transition from agriculture to building the industrial, financial, and
tourist sectors. The country has attracted considerable foreign direct
investments, earning one of Africa's highest average incomes, per
annum. The population is about one and a quarter million within a land
mass about ten times the size of Washington, DC. A serious approach to
property laws, in general, and Intellectual Property laws
specifically, is a major reason this well-ordered economy thrives.
What is "Unauthorized Access to Computer Data"?
This occurs when a person causes a computer to "perform a function,"
ie, enters with the intent of a going into a computer system to have
unauthorized access. Here, "Unauthorized" means either lacking general
authority to enter a system, or without specific consent of the owner
of the equipment. The law does not differentiate whether the person
had intent to go after specific data or programming, or whether he was
simply accessing the device with a general intent to enter, without
any firm goal in mind beyond that. Those convicted of this crime will
be fined 50,000 rupees and/or be sentenced to "penal servitude" for no
more than 5 years. The act allows for a defense of a "reasonable
belief" of consent or authority. (Part II, Section 3)
What is "Access with Intent to Commit Offences," or "Unauthorized
Password Disclosure"?
"Access with Intent to Commit Offences" occurs when a person causes a
computer system to do an act for the purpose of accessing any program
or data found within a computer system, with intent to commit any
crimes listed under the rest of this same Act. It is deemed irrelevant
whether the initial access was authorized, or unauthorized; or whether
the crime occurred at the same time, or at some period later. Those
convicted of this crime will be fined not exceeding 200,000 rupees,
and/or incarcerated not to exceed 20 years. (Part II, Section 4.)
"Unauthorized Password Disclosure" happens if anyone "knowingly
discloses any password, access code, or any other means of gaining
access to any program or data held in any computer system" to commit a
crime of theft, to damage files, or defame another, If convicted of
this crime, the person will be fined 50,000 rupees and/or incarcerated
not exceeding 5 years. (Part II, Section 8.)
What is "Unauthorized Access to and Interception of Computer Service"?
This occurs when anyone purposefully, and without permission or
authority, breaches a computer system for the end of obtaining
computer service to intercepts "any function of, or any data within a
computer system." Those convicted of this crime will be fined not
exceeding 100,000 rupees and/or incarcerated not to exceed 10 years.
If such an act impairs or compromises the function of a computer
system, including disruption or excision of data delivery, Those
convicted of this crime will be fined not exceeding 200,000 rupees
and/or incarcerated not exceeding 20 years. It is irrelevant if the
breacher's intent was to harm the system or disrupt the flow of data.
(Part II, Section 5.)
What is "Unauthorized Modification of Computer Material", or "Damaging
or Denying Access to Computer System"?
This occurs when anyone purposefully acts to cause an "unauthorized
modification of data held in any computer system." Those convicted of
this crime will be fined not exceeding 100,000 rupees and/or
incarcerated not exceeding 10 years.
If such an act suppresses the system or modifies data, those convicted
of this crime will be fined not exceeding 200,000 rupees and/or
incarcerated not exceeding 20 years.
A "modification" is illegal if the person doing so "is not himself
entitled to determine whether the modification should be made;" and
has done so beyond the scope of authority, or without permission. It
is irrelevant if the damage or modification is temporary or permanent.
(Part II, Section 6.)
"Damaging or Denying Access to Computer System" is when any person
who, without consent or authority, causes "degradation, failure,
interruption or obstruction of the operation of a computer system; or
denial of access to, or impairment of any program or data storage,"
those convicted of this crime will be fined not exceeding 200,000
rupees and/or incarcerated not exceeding 20 years. (Part II, Section
7.)
What is "Unlawful Possession of Devices and Data" or "Electronic
Fraud"?
This occurs when anyone "manufactures, sells, procures for use,
imports, distributes or otherwise makes available, a computer system
or any other device, designed or adapted primarily for the purpose of
committing any offence" under this Act. Also, to have such a computer
program in possession, is likewise a crime, unless with excuse or
justification. Those convicted of this crime will be fined not
exceeding 50,000 rupees and/or incarcerated not exceeding 5 years.
(Part II, Section 9.)
"Electronic Fraud" occurs when anyone "fraudulently causes loss of
property" to another by "any input, alteration, deletion or
suppression of data;" or interfering with a computer system, with
intent to commit this crime. Those convicted of this crime will be
fined not exceeding 200,000 rupees and/or incarcerated not exceeding
20 years. (Part II, Section 1)
MOROCCAN COPYRIGHT LAW
Kelly O'Connell, Miami Attorney Email
Morocco has a rich French legal history, which included European
intellectual property law. The French law was set aside to make way
for the global economy represented by World Intellectual Property
Organization, which Morocco assented to the standards of, first in the
Agreement on Trade-Related Aspects of Intellectual Property, or TRIPS
Agreement; and then, in the Law No. 2-00 on Copyright and Related
Rights of February 15, 2000. That Moroccan law is still influenced by
the old dahirs (laws).
To better understand Moroccan Copyright law, these questions will be
addressed: What are Copyright Protected Works, What are Their
Conditions? What Are Some Unusual Aspects of Moroccan Copyright Law?
How Does Copyright Ownership Work? What are the Formalities and
Documentation for Moroccan Copyright? Does the Law Treat as Special
Moroccan National Folkways?
History of Moroccan Copyright Law:
Morocco, like the rest of the Muslim world, did not have a strong
history of protecting Intellectual Property (IP) rights. In fact,
until the 20th century, the concept was foreign to the law of this
country. Morocco did have better IP rights than neighbors since it
accessed French laws on the topic, resulting in the dahirs of 1916 and
1970, although application of these standards was hardly uniform.
Morocco decided to set aside the old French model and strive for a
global model after it chose to attempt to become a member of the World
Intellectual Property Organization (WIPO). This represented a bold,
non-typical deviation from the colonial model when they rejected the
regional model to pursue membership in 1993 (Morocco also attempted to
become an early member of the European Union, but were rejected out of
hand for not technically being a European state). The Government was
given guidelines to follow, such as ratifying the Agreement on
Trade-Related Aspects of Intellectual Property, or TRIPS Agreement.
This transformed the intellectual property thinking in the state as
Morocco struggled to bring their legislation and regulations in
agreement with international standards and procedures.
Morocco, was classed a "developing country" and signed the TRIPS
Agreement, and was given a deadline of the year 2000 to redraft its IP
legislation to meet WIPO standards. This explains why the new IP law
was passed when it was, yielding Morocco Law No. 2-00 on Copyright and
Related Rights of February 15, 2000 was signed into effect.
What are Copyright Protected Works, What are Their Conditions?
"Protected work" in the Moroccan Copyright Law of 2000 are too
numerous to list, but Morocco accepts the Berne Convention, which does
have a long, but incomplete listing.
Protected works presume several characteristics. First, the work being
protected must be an "original", which is not a well-developed
definition in the Moroccan Copyright Law of 2000. The old 1970 dahir
and French law in general define an original as "when its
characteristic features and its form, or its form alone, make possible
the identification of its author." The new law refers to "originality"
as "works that are original intellectual creations in the literary and
artistic field." The test for originality, then, will be one of a
common sense persuasion through examples and proofs.
Second, the work cannot be simply an idea, but an original idea that
has been worked-up into some sort of model. Third, there must be an
author. This means, according to the law in Article 47, is the person
who is shown, via "display on each of the copies the name, pseudonym
or mark of the author." Therefore, a model work with a name on it,
were it unique, would translate to authorship, and all rights accrued
therein, as explained in Article 38. An anonymous, pseudonimical or
unknown work is "authored" by the publisher of such.
What Are Some Unusual Aspects of Moroccan Copyright Law?
While not completely unique, Moroccan copyright law follows the
French, as opposed to U.S. standard, and does not require copyrighted
articles be fixed on material support for copyright. This is
undoubtedly to help preserve Moroccan folksongs as IP.
Also, the 2000 Copyright law does not recognize "compilations", again
unlike its U.S. counterpart. This has created an interesting situation
where computer databases are not treated typically within the 2000
law, but case law (Coprosa decision) and legislation (1985 law)
developed to grant databanks original protection, and to help with
this void, given as a 'right of extraction and reuse', although the
protection has not gone beyond 15 years. Databases are classed
derivative works, in Article 5(b), but with no details as to scope and
term of the protection.
How Does Copyright Ownership Work?
In Article 1, paragraph (1), the new law states an author of a work is
"the natural person who created the work," and "He or she is the first
owner of the moral and economic right in the work," according to
Article 31. Proof is that "his or her name appears visibly on the
work," according to Article 38. Yet this name, according to Article 1,
paragraph (1), might not be the real author or person who commissioned
it. The law only applies to "real persons," not legal entities --
although the case law disagrees with this point -- and protection
lasts a lifetime plus fifty years, according to (Article 26).
What are the Formalities and Documentation for Moroccan Copyright?
Formalities:
For Copyright registration formalities, and unlike U.S. copyright, the
Moroccan Copyright Law of 2000 and the decree of 8 March 1965 do not
gave a particular manner of registering copyright or an stipulation to
deposit of works. While there is a stipulation in the dahir of 7
October 1932 that says four copies of any work produced in number and
put in circulation on Moroccan territory26 must be deposited with the
General Library and Archives (BGA) in Rabat. Strangely, this rule has
no relation to copyright, since this is registered nowhere else. The
Moroccan Copyright Office relies upon a procedure of declaration and
the admissibility of such on the Report of the Authentification
Commission to then accept them.
Documentation:
Again, for Moroccan texts, there is no documentary evidence needed to
attest to authorship of a work, or any body set up for such a purpose.
But the dahir of 7 October 1932 stipulates that on legal deposit, when
a work is put into circulation in Morocco, four copies shall be handed
over to the BGA, and a formal document is then issued in return. The
article gives the name and status of the author referring to 'claims',
not unlike copyright forms of the American and Canadian Copyright
Offices. But Article 12 of the dahir of 7 October 1932 does not create
copyright, nor constitute any kind of certificate of ownership, or a
defensible certificate of entitlement regarding such rights.
Does the Law Treat as Special Moroccan National Folkways?
Yes. Morocco has an extremely rich cultural heritage, expressed in
dance, song, and art. The old dahirs protected these works, naming
indigenous art and invention as, "folklore", being "unpublished works
where the identity of the author is unknown but where there is every
ground to presume that he is or was a Moroccan national," according to
dahir 29 of the 1970 code. Article 7, "Protection of Expressions of
Folklore" makes the fixing of folklore works under approval of the
Moroccan Copyright Bureau.
_______________________________________________
AfrICANN mailing list
AfrICANN(a)afrinic.net
https://lists.afrinic.net/mailman/listinfo.cgi/africann
--
becky
beckyit.blogspot.com
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
---------- Forwarded message ----------
From: Anne-Rachel Inné <annerachel(a)gmail.com>
Date: Nov 8, 2007 3:56 PM
Subject: [AfrICANN-discuss] On MAURITIUS COMPUTER MISUSE AND
CYBERCRIME ACT 2003 and MOROCCAN COPYRIGHT LAW
To: africann(a)afrinic.net
Cc: Me SARR Abdou Abbas <sarr.abdou(a)sarr-allard.com>
MAURITIUS COMPUTER MISUSE AND CYBERCRIME ACT 2003
Kelly O'Connell, Miami Attorney Email
Mauritius is an island located in the Atlantic near Southern Africa,
in the Indian Ocean, east of Madagascar. It was first explored by
Portuguese sailors in the early in the 16th century. Later it was
controlled by the Dutch, French, and British until independence was
achieved in 1968. Given its inherent limitations of history, location,
and natural resources, the country has developed into an unmitigated
success, by anyone's standard.
The Government carefully assembled the infrastructure for a large,
state-of-the-art cyber complex in the early 2000's which should prove
attractive to any company wishing for access to the Asian continent
within a business-friendly and highly modernized infrastructure. This
law is an attempt to protect any foreign or local businesses setting
up shop there.
To better understand the Computer Misuse and Cybercrime Act 2003; Act
No. 22 of 2003; Offense, found in Part II, these questions will be
answered: What is "Unauthorized Access to Computer Data"? What is
"Access with Intent to Commit Offences," or "Unauthorized Password
Disclosure"? What is "Unauthorized Access to and Interception of
Computer Service"? What is "Unauthorized Modification of Computer
Material", or "Damaging or Denying Access to Computer System"? What is
"Unlawful Possession of Devices and Data" or "Electronic Fraud"?
Mauritius island state has staged an impressive economic evolution,
based upon its stable democracy, featuring a British system of regular
free elections and a positive human rights record, as the markets
transition from agriculture to building the industrial, financial, and
tourist sectors. The country has attracted considerable foreign direct
investments, earning one of Africa's highest average incomes, per
annum. The population is about one and a quarter million within a land
mass about ten times the size of Washington, DC. A serious approach to
property laws, in general, and Intellectual Property laws
specifically, is a major reason this well-ordered economy thrives.
What is "Unauthorized Access to Computer Data"?
This occurs when a person causes a computer to "perform a function,"
ie, enters with the intent of a going into a computer system to have
unauthorized access. Here, "Unauthorized" means either lacking general
authority to enter a system, or without specific consent of the owner
of the equipment. The law does not differentiate whether the person
had intent to go after specific data or programming, or whether he was
simply accessing the device with a general intent to enter, without
any firm goal in mind beyond that. Those convicted of this crime will
be fined 50,000 rupees and/or be sentenced to "penal servitude" for no
more than 5 years. The act allows for a defense of a "reasonable
belief" of consent or authority. (Part II, Section 3)
What is "Access with Intent to Commit Offences," or "Unauthorized
Password Disclosure"?
"Access with Intent to Commit Offences" occurs when a person causes a
computer system to do an act for the purpose of accessing any program
or data found within a computer system, with intent to commit any
crimes listed under the rest of this same Act. It is deemed irrelevant
whether the initial access was authorized, or unauthorized; or whether
the crime occurred at the same time, or at some period later. Those
convicted of this crime will be fined not exceeding 200,000 rupees,
and/or incarcerated not to exceed 20 years. (Part II, Section 4.)
"Unauthorized Password Disclosure" happens if anyone "knowingly
discloses any password, access code, or any other means of gaining
access to any program or data held in any computer system" to commit a
crime of theft, to damage files, or defame another, If convicted of
this crime, the person will be fined 50,000 rupees and/or incarcerated
not exceeding 5 years. (Part II, Section 8.)
What is "Unauthorized Access to and Interception of Computer Service"?
This occurs when anyone purposefully, and without permission or
authority, breaches a computer system for the end of obtaining
computer service to intercepts "any function of, or any data within a
computer system." Those convicted of this crime will be fined not
exceeding 100,000 rupees and/or incarcerated not to exceed 10 years.
If such an act impairs or compromises the function of a computer
system, including disruption or excision of data delivery, Those
convicted of this crime will be fined not exceeding 200,000 rupees
and/or incarcerated not exceeding 20 years. It is irrelevant if the
breacher's intent was to harm the system or disrupt the flow of data.
(Part II, Section 5.)
What is "Unauthorized Modification of Computer Material", or "Damaging
or Denying Access to Computer System"?
This occurs when anyone purposefully acts to cause an "unauthorized
modification of data held in any computer system." Those convicted of
this crime will be fined not exceeding 100,000 rupees and/or
incarcerated not exceeding 10 years.
If such an act suppresses the system or modifies data, those convicted
of this crime will be fined not exceeding 200,000 rupees and/or
incarcerated not exceeding 20 years.
A "modification" is illegal if the person doing so "is not himself
entitled to determine whether the modification should be made;" and
has done so beyond the scope of authority, or without permission. It
is irrelevant if the damage or modification is temporary or permanent.
(Part II, Section 6.)
"Damaging or Denying Access to Computer System" is when any person
who, without consent or authority, causes "degradation, failure,
interruption or obstruction of the operation of a computer system; or
denial of access to, or impairment of any program or data storage,"
those convicted of this crime will be fined not exceeding 200,000
rupees and/or incarcerated not exceeding 20 years. (Part II, Section
7.)
What is "Unlawful Possession of Devices and Data" or "Electronic Fraud"?
This occurs when anyone "manufactures, sells, procures for use,
imports, distributes or otherwise makes available, a computer system
or any other device, designed or adapted primarily for the purpose of
committing any offence" under this Act. Also, to have such a computer
program in possession, is likewise a crime, unless with excuse or
justification. Those convicted of this crime will be fined not
exceeding 50,000 rupees and/or incarcerated not exceeding 5 years.
(Part II, Section 9.)
"Electronic Fraud" occurs when anyone "fraudulently causes loss of
property" to another by "any input, alteration, deletion or
suppression of data;" or interfering with a computer system, with
intent to commit this crime. Those convicted of this crime will be
fined not exceeding 200,000 rupees and/or incarcerated not exceeding
20 years. (Part II, Section 1)
MOROCCAN COPYRIGHT LAW
Kelly O'Connell, Miami Attorney Email
Morocco has a rich French legal history, which included European
intellectual property law. The French law was set aside to make way
for the global economy represented by World Intellectual Property
Organization, which Morocco assented to the standards of, first in the
Agreement on Trade-Related Aspects of Intellectual Property, or TRIPS
Agreement; and then, in the Law No. 2-00 on Copyright and Related
Rights of February 15, 2000. That Moroccan law is still influenced by
the old dahirs (laws).
To better understand Moroccan Copyright law, these questions will be
addressed: What are Copyright Protected Works, What are Their
Conditions? What Are Some Unusual Aspects of Moroccan Copyright Law?
How Does Copyright Ownership Work? What are the Formalities and
Documentation for Moroccan Copyright? Does the Law Treat as Special
Moroccan National Folkways?
History of Moroccan Copyright Law:
Morocco, like the rest of the Muslim world, did not have a strong
history of protecting Intellectual Property (IP) rights. In fact,
until the 20th century, the concept was foreign to the law of this
country. Morocco did have better IP rights than neighbors since it
accessed French laws on the topic, resulting in the dahirs of 1916 and
1970, although application of these standards was hardly uniform.
Morocco decided to set aside the old French model and strive for a
global model after it chose to attempt to become a member of the World
Intellectual Property Organization (WIPO). This represented a bold,
non-typical deviation from the colonial model when they rejected the
regional model to pursue membership in 1993 (Morocco also attempted to
become an early member of the European Union, but were rejected out of
hand for not technically being a European state). The Government was
given guidelines to follow, such as ratifying the Agreement on
Trade-Related Aspects of Intellectual Property, or TRIPS Agreement.
This transformed the intellectual property thinking in the state as
Morocco struggled to bring their legislation and regulations in
agreement with international standards and procedures.
Morocco, was classed a "developing country" and signed the TRIPS
Agreement, and was given a deadline of the year 2000 to redraft its IP
legislation to meet WIPO standards. This explains why the new IP law
was passed when it was, yielding Morocco Law No. 2-00 on Copyright and
Related Rights of February 15, 2000 was signed into effect.
What are Copyright Protected Works, What are Their Conditions?
"Protected work" in the Moroccan Copyright Law of 2000 are too
numerous to list, but Morocco accepts the Berne Convention, which does
have a long, but incomplete listing.
Protected works presume several characteristics. First, the work being
protected must be an "original", which is not a well-developed
definition in the Moroccan Copyright Law of 2000. The old 1970 dahir
and French law in general define an original as "when its
characteristic features and its form, or its form alone, make possible
the identification of its author." The new law refers to "originality"
as "works that are original intellectual creations in the literary and
artistic field." The test for originality, then, will be one of a
common sense persuasion through examples and proofs.
Second, the work cannot be simply an idea, but an original idea that
has been worked-up into some sort of model. Third, there must be an
author. This means, according to the law in Article 47, is the person
who is shown, via "display on each of the copies the name, pseudonym
or mark of the author." Therefore, a model work with a name on it,
were it unique, would translate to authorship, and all rights accrued
therein, as explained in Article 38. An anonymous, pseudonimical or
unknown work is "authored" by the publisher of such.
What Are Some Unusual Aspects of Moroccan Copyright Law?
While not completely unique, Moroccan copyright law follows the
French, as opposed to U.S. standard, and does not require copyrighted
articles be fixed on material support for copyright. This is
undoubtedly to help preserve Moroccan folksongs as IP.
Also, the 2000 Copyright law does not recognize "compilations", again
unlike its U.S. counterpart. This has created an interesting situation
where computer databases are not treated typically within the 2000
law, but case law (Coprosa decision) and legislation (1985 law)
developed to grant databanks original protection, and to help with
this void, given as a 'right of extraction and reuse', although the
protection has not gone beyond 15 years. Databases are classed
derivative works, in Article 5(b), but with no details as to scope and
term of the protection.
How Does Copyright Ownership Work?
In Article 1, paragraph (1), the new law states an author of a work is
"the natural person who created the work," and "He or she is the first
owner of the moral and economic right in the work," according to
Article 31. Proof is that "his or her name appears visibly on the
work," according to Article 38. Yet this name, according to Article 1,
paragraph (1), might not be the real author or person who commissioned
it. The law only applies to "real persons," not legal entities --
although the case law disagrees with this point -- and protection
lasts a lifetime plus fifty years, according to (Article 26).
What are the Formalities and Documentation for Moroccan Copyright?
Formalities:
For Copyright registration formalities, and unlike U.S. copyright, the
Moroccan Copyright Law of 2000 and the decree of 8 March 1965 do not
gave a particular manner of registering copyright or an stipulation to
deposit of works. While there is a stipulation in the dahir of 7
October 1932 that says four copies of any work produced in number and
put in circulation on Moroccan territory26 must be deposited with the
General Library and Archives (BGA) in Rabat. Strangely, this rule has
no relation to copyright, since this is registered nowhere else. The
Moroccan Copyright Office relies upon a procedure of declaration and
the admissibility of such on the Report of the Authentification
Commission to then accept them.
Documentation:
Again, for Moroccan texts, there is no documentary evidence needed to
attest to authorship of a work, or any body set up for such a purpose.
But the dahir of 7 October 1932 stipulates that on legal deposit, when
a work is put into circulation in Morocco, four copies shall be handed
over to the BGA, and a formal document is then issued in return. The
article gives the name and status of the author referring to 'claims',
not unlike copyright forms of the American and Canadian Copyright
Offices. But Article 12 of the dahir of 7 October 1932 does not create
copyright, nor constitute any kind of certificate of ownership, or a
defensible certificate of entitlement regarding such rights.
Does the Law Treat as Special Moroccan National Folkways?
Yes. Morocco has an extremely rich cultural heritage, expressed in
dance, song, and art. The old dahirs protected these works, naming
indigenous art and invention as, "folklore", being "unpublished works
where the identity of the author is unknown but where there is every
ground to presume that he is or was a Moroccan national," according to
dahir 29 of the 1970 code. Article 7, "Protection of Expressions of
Folklore" makes the fixing of folklore works under approval of the
Moroccan Copyright Bureau.
_______________________________________________
AfrICANN mailing list
AfrICANN(a)afrinic.net
https://lists.afrinic.net/mailman/listinfo.cgi/africann
--
becky
beckyit.blogspot.com
1
0