Discussion: Shaping Kenya’s Cybersecurity Ecosystem
Thanks for sharing the pdf. version and kudos on your LLM thesis …
looking forward to reading it.
Stay happy,
Mutheu.
On Mon, Aug 19, 2024 at 2:01 PM Elizabeth Mosa <[email protected]> wrote:
> Good afternoon Mutheu
>
> This is the link
> erepository.uonbi.ac.ke/handle/11295/164624?show=full , the system
> may have had a down time. I have also attached the paper for ease of
> reference.
>
> Regards
> Elizabeth
>
>
>
> On Fri, Aug 16, 2024 at 10:37 AM A Mutheu via KICTANet <
> [email protected]> wrote:
>
>> Dear Elizabeth,
>>
>> Do you have another link to your research paper on the efficacy of the
>> CMCA and or a pdf. version you can attach here as my device can not open
>> the link you shared as it’s not a secure link.
>>
>> Stay happy,
>> Mutheu.
>>
>>
>>
>> On Wed, Aug 14, 2024 at 10:58 AM Elizabeth Mosa via KICTANet <
>> [email protected]> wrote:
>>
>>> Morning
>>>
>>> This is a timely discussion, how do we participate?
>>>
>>> I have also done a research paper on efficacy of the CMCA. You can read
>>> it here
>>> erepository.uonbi.ac.ke/handle/11295/164624?show=full
>>> and share feedback.
>>>
>>> Kind regards
>>> Elizabeth
>>>
>>> On Wed, 14 Aug 2024, 09:56 David Indeje via KICTANet, <
>>> [email protected]> wrote:
>>>
>>>> *Our Day 2 * discussion on the Computer Misuse and Cybercrimes Act
>>>> (CMCA)
>>>> <ipkenya.wordpress.com/wp-content/uploads/2018/05/the-computer-misuse-and-cybercrimes-act-2018.pdf>
>>>> will focus on:
>>>>
>>>>
>>>> *Section 3: Effectiveness of Legal Actions Pursuant to the CMCA.*
>>>>
>>>> 1. Do you believe that legal actions taken under the CMCA have been
>>>> effective in deterring computer misuse and cybercrimes? If not then why do
>>>> you think they have been ineffective?
>>>> 2. In your opinion are the penalties prescribed by the CMCA
>>>> sufficient to deter cybercriminals? If not then which sections do you think
>>>> need higher penalties, and what penalties would you propose in such an
>>>> instance?
>>>> 3. Are there instances of misuse of the CMCA for political purposes
>>>> or to target specific individuals or groups?
>>>> 4. How has the public perception of the CMCA and its enforcement
>>>> impacted the effectiveness of legal actions under the CMCA?
>>>>
>>>>
>>>> *Section 4: Effectiveness of Safeguards Under the CMCA.*
>>>>
>>>> 1. Are the safeguards in place to prevent abuse of the CMCA, such
>>>> as those related to surveillance, search, and censorship, adequate? If not
>>>> then what can be done to enhance them?
>>>> 2. How can these safeguards be strengthened to protect individual
>>>> rights and freedoms?
>>>> 3. Have there been instances of abuse of the CMCA that have come to
>>>> your attention?
>>>> 4. What mechanisms are in place to hold accountable those who
>>>> misuse the CMCA?
>>>>
>>>>
>>>>
>>>>
>>>> —
>>>> *Kind Regards,*
>>>>
>>>> *David Indeje*
>>>>
>>>> *@**KICTANet* <www.kictanet.or.ke/>
>>>> * Communications *_____________________________________
>>>> +254 (0) 711 385 945 | +254 (0) 734 024 856
>>>> KICTANet portals
>>>> Connect With Us <linktr.ee/Kictanet>
>>>> ______________________________________
>>>>
>>>>