Join Us Today for an Eye-Opening Discussion on Computer Misuse and Cybercrimes Regulations!
Dear Listers, Exciting News! Join us today, at đź•’ 8PM-9PM EAT, for a Twitter Space event where we'll delve into...
Dear Listers, Exciting News! Join us today, at đź•’ 8PM-9PM EAT, for a Twitter Space event where we'll delve into...
Dear Listers, Amidst the ongoing online discussions surrounding the Computer Misuse and Cybercrimes (Critical Information Infrastructure and Cybercrime Management) Regulations,...
Dear Listers, Strong encryption is a fundamental part of how we remain safe online and offline: https://youtu.be/y5G_Rggsg8E. It means people...
Thank you Lawrence for your cyber-secure informed inputs and views. We shall hold the Twitter Space with the disseminated/ consolidated...
Thank you so much Counsel and Florence for expounding and the informative insights. Dear Listers, Considering *Regulation 29 *entails the*...
Linda, Thank you for this. I happened to attend the public session on monday and will be looking forward to...
Section 13 13. (2) The cybersecurity awareness programme under paragraph (1) shall include the following topics—..... Question: Does this need...
(l) Monitor all databases established for purposes of establishing their integrity and confidentiality for the attainment of the objectives of...
Dear Linda, *Should we let the existing regulatory bodies do their jobs instead of introducing the given regulations that might...