Google, could have a record of everything you have said around it for years, and you can listen to it yourself.
The company quietly records many of the conversations that people have around its products.
The feature works as a way of letting people search with their voice, and storing those recordings presumably lets Google improve its language recognition tools as well as the results that it gives to people.
Read on:-
In relation to this discussion we would love to have a comment from the Ministry and Google.
Great thanks Sam,
We will collate all the comments and forwad them to the Ministry.
Thank you
Best Regards
On 6/30/16, Sam Oduor <sam.oduor@gmail.com> wrote:Hi BarrackA great comment has been posted on the Jadii PlatformJune Tessy - a day ago Do we really need another 'specialized' agency yetthere are already existing units in Government and Regulators that aremandated to deal with these like the National Intelligence Service, ICTA,CA Perhaps building onto the already existing units in terms of resourcesand capacity may be more sustainableOn Thu, Jun 30, 2016 at 7:29 AM, Barrack Otieno via kictanet <kictanet@lists.kictanet.or.ke> wrote:Listers,Many thanks to those who contribued to day 6 discussions. The threadis still open, we also encourage listers to edit the policy directlyon the Jadili platform(http://jadili.ictpolicy.org/docs/kenya-ict-policy).Today we focus on the following areas:*Online Citizen Safety,*Child Protection*Privacy issues*Security business transactions (Info-Security)*Security & Reliability of Critical ICT infrastructureThe Background:The more we automate and rely on digital services, the more vulnerablewe become as a society to cybercrime and other threats facing thedigital society.The regulator has a Computer Emergency Response Team (CERT), theindustry (TESPOK) also has a CERT, the Department of CriminalInvestigation & National Intelligence also have CERT. What is notclear is whether there is a framework to have these teams workingtogether and their capacity to counter a full-blown cyber attackagainst our digital national assets.Additionally, the tension between citizen privacy and nationalsecurity, citizen privacy and business (profit) concerns remainperhaps due to lack of Data Protection, eTransaction and other laws.Finally, special protection for vulnerable groups (children) goingonline is non-existent.What needs to be done around these issues?Kindly submit your views.Best Regards--Barrack O. Otieno+254721325277+254733206359Skype: barrack.otienoPGP ID: 0x2611D86A_______________________________________________kictanet mailing listkictanet@lists.kictanet.or.kehttps://lists.kictanet.or.ke/mailman/listinfo/kictanetUnsubscribe or change your options athttps://lists.kictanet.or.ke/mailman/options/kictanet/sam.oduor%40gmail.comThe Kenya ICT Action Network (KICTANet) is a multi-stakeholder platformfor people and institutions interested and involved in ICT policy andregulation. The network aims to act as a catalyst for reform in the ICTsector in support of the national aim of ICT enabled growth anddevelopment.KICTANetiquette : Adhere to the same standards of acceptable behaviorsonline that you follow in real life: respect people's times andbandwidth,share knowledge, don't flame or abuse or personalize, respect privacy, donot spam, do not market your wares or qualifications.--Samson Oduor
--
Barrack O. Otieno
+254721325277
+254733206359
Skype: barrack.otieno
PGP ID: 0x2611D86A
_______________________________________________
kictanet mailing list
kictanet@lists.kictanet.or.ke
https://lists.kictanet.or.ke/mailman/listinfo/kictanet
Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/info%40alyhussein.com
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.