About Salma Shabaan (Edit profile)

Journalist by proffesion.Have passion in film making and photography.
I can , i will!


By |April 24th, 2019|

Kenya has made several attempts to develop a law on Data Protection. The Ministry of Information, Communications and Technology (MoICT), together with the Communications Authority of Kenya (CA), led a stakeholder process to draft a ‘Kenya Data Protection Bill’. At the same time,the Senate has drafted and tabled a ‘Data Protection Bill,2018’. While the two […]

PCCW Global and TESPOK to launch first African roaming IPX

By |April 17th, 2019|

HKT (SEHK:6823) – Hong Kong, April 11, 2019

PCCW Global, the international operating division of HKT, Hong Kong’s premier telecommunications service provider, and Kenyan technology service provider TESPOK have signed a Memorandum of Understanding to provide Africa’s first mobile data roaming exchange point, an IPX based networking infrastructure that will keep roaming data on the continent […]


By |October 11th, 2018|

Online shopping is big business these days, with more and more consumers across the world turning to the world wide web to purchase goods. This is especially the case in countries where eCommerce is really taking hold over the way people shop.

Staying safe while you’re shopping online is paramount, and knowledgeable shoppers know what approaches […]

Ways to Bridge the Gender Gap in STEM:

By |July 6th, 2018|

Here are 5 ways you can help bridge the gap—by piquing the interest of your female students in male-dominated STEM fields and helping to change perceptions of these professions as “masculine”.

Assume interest, and Be Inclusive

Both men and women enforce gender stereotypes about math and science in children from a young age, though most people […]


By |June 18th, 2018|

Every age group is vulnerable to cyber bullying, but teenagers and young adults are common victims. Cyber bullying is a growing problem in schools. Cyber bullying has become an issue because the Internet is fairly anonymous, which is appealing to bullies because their intimidation is difficult to trace. Unfortunately, rumors, threats and photos can be […]

What small businesses need to know about cyber security:

By |May 22nd, 2018|

Generally speaking, cybersecurity emphasizes on protecting computer-based devices and data from unauthorized access, theft or modification. In turn, a robust cybersecurity platform bolsters the reputation of the institution practicing it, which, by extension, opens new business channels and opportunities.

Notably many local small businesses have adopted extensive use of the internet to meet their trade needs, […]

TESPOK Lobbies for Deletion of Two Clauses in the Kenya Computer and Cybercrimes Bill 2017.

By |February 28th, 2018|

To begin with, TESPOK proposes an amendment for Clause 8, which highlights the penalty for the offense of illegal devices. It is suggested the word ‘illegal’ be included in the clause’s definition for clarity as it has not been defined.

Secondly, Clause 13, which looks into child pornography cases, should drop transmission of child pornography as […]

Kenyan telcos in dilemma over infrastructure sharing .

By |February 28th, 2018|

The study looked at mobile operators other than telecommunication service providers. There are Tier 2 and Tier 3 players that the consultant left out and that may make one question the recommendations,” she said. The other big question is why Airtel declined to apply for Government subsidy – under the Universal Service Fund – to […]

Opinion:Cyber Security bill will make us responsible for our actions online.

By |February 28th, 2018|

On the whole the Computer and Cyber Crime bill 2017 addresses important concerns that affect everyone but the basis of online security begins with us. It will put many in check, since having passwords for systems you should not access will be outlawed as soon as it is accented and shall carry a fine on […]

Inside plan that could allow spying on citizens.

By |February 19th, 2018|

It has taken Kenya’s ICT sector close to eight years to come up with an appropriate cyber security draft bill. What is a bit saddening is the fact that we have put out the cyber security bill before we could have the data protection required for effective implementation of the Access to information law. Maybe […]