REQUEST FOR PROPOSALS:FOR A LEGAL CONSULTANT TO WORK ON THE PROPOSED DATA PROTECTION BILL 2018.

By |April 24th, 2019|

Kenya has made several attempts to develop a law on Data Protection. The Ministry of Information, Communications and Technology (MoICT), together with the Communications Authority of Kenya (CA), led a stakeholder process to draft a ‘Kenya Data Protection Bill’. At the same time,the Senate has drafted and tabled a ‘Data Protection Bill,2018’. While the two […]

PCCW Global and TESPOK to launch first African roaming IPX

By |April 17th, 2019|

HKT (SEHK:6823) – Hong Kong, April 11, 2019

PCCW Global, the international operating division of HKT, Hong Kong’s premier telecommunications service provider, and Kenyan technology service provider TESPOK have signed a Memorandum of Understanding to provide Africa’s first mobile data roaming exchange point, an IPX based networking infrastructure that will keep roaming data on the continent […]

ONLINE HARASSMENT.

By |June 18th, 2018|

Every age group is vulnerable to cyber bullying, but teenagers and young adults are common victims. Cyber bullying is a growing problem in schools. Cyber bullying has become an issue because the Internet is fairly anonymous, which is appealing to bullies because their intimidation is difficult to trace. Unfortunately, rumors, threats and photos can be […]

What small businesses need to know about cyber security:

By |May 22nd, 2018|

Generally speaking, cybersecurity emphasizes on protecting computer-based devices and data from unauthorized access, theft or modification. In turn, a robust cybersecurity platform bolsters the reputation of the institution practicing it, which, by extension, opens new business channels and opportunities.

Notably many local small businesses have adopted extensive use of the internet to meet their trade needs, […]

TESPOK Lobbies for Deletion of Two Clauses in the Kenya Computer and Cybercrimes Bill 2017.

By |February 28th, 2018|

To begin with, TESPOK proposes an amendment for Clause 8, which highlights the penalty for the offense of illegal devices. It is suggested the word ‘illegal’ be included in the clause’s definition for clarity as it has not been defined.

Secondly, Clause 13, which looks into child pornography cases, should drop transmission of child pornography as […]

Opinion:Cyber Security bill will make us responsible for our actions online.

By |February 28th, 2018|

On the whole the Computer and Cyber Crime bill 2017 addresses important concerns that affect everyone but the basis of online security begins with us. It will put many in check, since having passwords for systems you should not access will be outlawed as soon as it is accented and shall carry a fine on […]

CALL FOR PROPOSALS FOR RESEARCH CONSULTANT.

By |January 29th, 2018|

The ICT industry in Kenya has made several attempts to develop a law on cyber security. The ICT Ministry together with the Kenya Law Reform Commission (KLRC) have drafted Computer and Cyber Crimes (CCC), Bill 2016. The Bill was approved by Cabinet on the 6th April, 2017 and forwarded to the Attorney General for publication […]

CALL FOR PROPOSALS FOR LEGAL CONSULTANT

By |January 29th, 2018|

The ICT industry in Kenya has made several attempts to develop a law on cyber security. The ICT Ministry together with the Kenya Law Reform Commission (KLRC) have drafted Computer and Cyber Crimes (CCC), Bill 2016. The Bill was approved by Cabinet on the 6th April, 2017 and forwarded to the Attorney General for publication […]

HOW TO IDENTIFY FAKE NEWS

By |September 26th, 2017|

Have you ever read a news story and tried to establish the authenticity of the information to tell whether it is true or false? How do you distinguish real facts from alternative facts?

In the last couple of months, Kenyans have become victims of fake news where disinformation was employed to influence people to vote during […]

ICANN TO CHANGE INTERNET ADDRESSING SYSTEM

By |August 31st, 2017|

The Internet Corporation for Assigned Names and Numbers (ICANN) is planning a rollover of Root Zone Domain Name System security Extensions (DNSSEC) KSK as required in the Root Zone KSK Operator DNSSEC practice statement on 11th October 2017.Rolling the KSK key means generating a new cryptographic public and private key that will keep the Internet […]