Listers, This is an interesting topic now that almost every service we get from the government is being automated to ensure our personal details are captured. For instance, our children are being registered in schools digitally, NTSA, KRA, NHIF/NSSF and so much more. It is a fact that data sharing is a way of life now. Credit cards, e-commerce, and online banking all rely on personal data being transmitted to companies via technology. Thus, security must become our way of life too. On the other hand, We can’t rely on orgs, companies, and brands to protect our data in the way that we would. Therefore, we should: Not give up personal data easily Ultimately, how policies are crafted, and how much we invest in data security will pay off. For instance, The enactment of the Access to Information Act ensures that information within Government custody is freely available to the public. This will provide opportunities for openness and transparency thus stifling corruption. The public will have the opportunity to peruse public information and hold government accountable. *Kind Regards,* *David Indeje * +254 (0) 711 385 945| +254 (0) 734 024 856 Khusoko <http://bit.ly/2eJF9B4> <https://www.facebook.com/DavidIndeje/> <https://twitter.com/David_Indeje> <http://ke.linkedin.com/pub/david-indeje/17/7b9/647> Skype: david.indeje On Wed, 11 Jul 2018 at 08:02, Grace Bomu via kictanet < kictanet@lists.kictanet.or.ke> wrote:
Listers, Thank you to all who contributed to yesterday's topic. The thread is still open for those who may have further thoughts on content regulation. Welcome to Day 2 of online pre KIGF debates where out topic today is Strengthening Data Security in the Context of Emerging Trends. We shall look at cybersecurity in the context of data.
Barely a few weeks ago, social media was awash with memes of Wazir Boniface Chacha, the young man alleged to have conned MPs after getting access to their phone data. Later when this was used as a justification in debates for the Cybercrime Act, some wondered whether the political process had used the Chacha saga to justify the quick passage of a law creating offences.
But beyond "small data" in our personal possession, many SMEs , corporations, institutions, societies and other bodies are holding significant amounts of data. In this community, the wider issue of cyber security has been a recurring theme in KIGF. It is generally agreed that the best approach is a multi-pronged one that includes the law, good practices, effective mitigation and response to incidences at multiple levels, creation of awareness and technical solutions among others. Having gotten a new law in the form of the Cybercrimes Act, are we assured of data security? Are our existing mechanisms for mitigation and response to incidences adequate for emerging threats? Do we have positive cases or good practices to imitate? What challenges that remain and how can we address them?
Welcome to the discussion.
-- Grace Mutung'u Skype: gracebomu @Bomu PGP ID : 0x33A3450F
_______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke https://lists.kictanet.or.ke/mailman/listinfo/kictanet Twitter: http://twitter.com/kictanet Facebook: https://www.facebook.com/KICTANet/ Domain Registration sponsored by www.eacdirectory.co.ke
Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/davidindeje%40gmail.co...
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.