CALL FOR PUBLIC PARTICIPATION: COMPUTER MISUSE AND CYBERCRIMES (CRITICAL INFORMATION INFRASTRUCTURE AND CYBERCRIME MANAGEMENT) DRAFT REGULATIONS

Aren’t these institutions better established via Statute (Act) rather than
through subsidiary legislation (regulations)?
Regards,
JG
On Tue, 29 Aug 2023, 09:56 Eshuchi Richard via KICTANet, <
[email protected]> wrote:
> The National Computer and Cybercrime Coordination Committee (NC4) has
> finally published draft regulations to manage Kenya’s critical information
> infrastructure.
>
> nc4.go.ke/cmca-2018-draft-regulations/
>
> Big win on localization that’ll hopefully spark conversation not only on
> software but hardware as well. A time must come when devices are built
> secure by design or
> default (Blackberry style).
>
>
>
>