Dear David,
This is a timely and interesting discussion. My responses are as follows;
1. Do you believe that legal actions taken under the CMCA have been effective in deterring computer misuse and cybercrimes? To some extent
If not then why do you think they have been ineffective?
Some of the challenges include limited resources due to the nature of the cases, lack of awareness on the legal actions available under the CMCA, proper recruitment of technical expertise and slow judicial processes have hindered its full effectiveness. Additionally, the ever-evolving nature of cyber threats often outpaces legislative frameworks, making it difficult to address new forms of cybercrimes.
2. In your opinion are the penalties prescribed by the CMCA sufficient to deter cybercriminals? If not then which sections do you think need higher penalties, and what penalties would you propose in such an instance?
These penalties may not be sufficient, especially for offenses like cyber espionage, cyber terrorism, and large-scale financial fraud. Increasing penalties for these offenses could enhance deterrence. For example; enhancing penalties for cyber terrorism (Section 33) and cyber espionage (Section 21) to include longer imprisonment terms and higher fines could be considered.
Kind regards,
Linda Gichohi.
_______________________________________________Our Day 2 discussion on the Computer Misuse and Cybercrimes Act (CMCA) will focus on:
Section 3: Effectiveness of Legal Actions Pursuant to the CMCA.
- Do you believe that legal actions taken under the CMCA have been effective in deterring computer misuse and cybercrimes? If not then why do you think they have been ineffective?
- In your opinion are the penalties prescribed by the CMCA sufficient to deter cybercriminals? If not then which sections do you think need higher penalties, and what penalties would you propose in such an instance?
- Are there instances of misuse of the CMCA for political purposes or to target specific individuals or groups?
- How has the public perception of the CMCA and its enforcement impacted the effectiveness of legal actions under the CMCA?
Section 4: Effectiveness of Safeguards Under the CMCA.
- Are the safeguards in place to prevent abuse of the CMCA, such as those related to surveillance, search, and censorship, adequate? If not then what can be done to enhance them?
- How can these safeguards be strengthened to protect individual rights and freedoms?
- Have there been instances of abuse of the CMCA that have come to your attention?
- What mechanisms are in place to hold accountable those who misuse the CMCA?
--Kind Regards,+254 (0) 711 385 945 | +254 (0) 734 024 856KICTANet portalsConnect With Us______________________________________
KICTANet mailing list -- kictanet@lists.kictanet.or.ke
To unsubscribe send an email to kictanet-leave@lists.kictanet.or.ke
Unsubscribe or change your options at: https://mm3-lists.kictanet.or.ke/mm/lists/kictanet.lists.kictanet.or.ke/
Mailing List Posts Online: https://posts.kictanet.or.ke/
Twitter: https://twitter.com/KICTANet/
Facebook: https://www.facebook.com/KICTANet/
Instagram: https://www.instagram.com/KICTANet/
LinkedIn: https://www.linkedin.com/company/kictanet/
YouTube: https://www.youtube.com/channel/UCbcLVjnPtTGBEeYLGUb2Yow/
WhatsApp Channel: https://whatsapp.com/channel/0029VaQsX4w6mYPIctLsGh1K
KICTANet is a multi-stakeholder Think Tank for people and institutions interested and involved in ICT policy and regulation.
KICTANet is a catalyst for reform in the Information and Communication Technology sector. Its work is guided by four pillars
of Policy Advocacy, Capacity Building, Research, and Stakeholder Engagement.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's
times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your
wares or qualifications.
PRIVACY POLICY: See https://mm3-lists.kictanet.or.ke/mm/lists/kictanet.lists.kictanet.or.ke/
KICTANet - The Power of Communities, is Kenya's premier ICT policy engagement platform.