• Latest
  • All
  • How To
cyber crime kenya

Review on the New Computer Misuse and Cybercrimes Act – Kenya

May 24, 2018
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
DHgate Tablet Cases deals
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Review on the New Computer Misuse and Cybercrimes Act – Kenya

June Okal by June Okal
May 24, 2018
in Opinion
Reading Time: 4 mins read
265
10
cyber crime kenya

cyber crimeThe new buzzword on the lips of people in the tech and media industry is the new cybercrimes law. The Computer Misuse and Cybercrimes Act of 2018 was drafted and assented to on the 16th May 2018. It comes into force in a few days, (30th May 2018).

You can access the law here [PDF].

The law is expected to curb cybercrimes and computer related offences to enable timely and effective detection, prohibition, prevention, response, investigation and prosecution of computer and cybercrime.

The National Computer and Cybercrimes Co-ordination Committee

The law creates the National Computer and Cybercrimes Co-ordination Committee. The role of this committee includes advising the Government on security related aspects touching on matters relating to blockchain technology, critical infrastructure, mobile money and trust account.

Blockchain and Cryptocurrency

Blockchain technology under this law is defined as a digitized, decentralized, public ledger of all crypto currency transactions.

The law does not talk of anything on the use of the technology for cryptocurrency or other distributed ledger uses other than that, the new committee will advice on this.

Critical Infrastructure

“Critical information infrastructure system or data” means an information system, program or data that supports or performs a function with respect to a national critical information infrastructure;

The Director of the New National Computer and Cybercrimes Co-ordination Committee is expected to designate certain systems as critical infrastructure. These mean the processes, systems, facilities, technologies, networks, assets and services essentials to the health, safety, security or economic wellbeing of Kenya.

Cybersquatting and Domain Name

Cybersquatting simply put is, taking someone else’s domain name knowingly for a wrongful purpose. For example, registering the domain name google.or.ke and you are definitely not Google. This is now expressly recognized in Kenyan law and it is laudable.

Mobile Money

“Mobile money” means electronic transfer of funds between banks or accounts’ deposit or withdrawal of funds or payment of bills by mobile phone.

If you’re in Kenya, you’ve probably used a mobile money service and more likely than not, have sent money to the wrong number. You call the person (remembering we’re a 80% Christian nation) hoping that morality and ethics shall prevail, asking the guy to woishe send you the cash back. Even a part of it. We all know, that rarely happens. You ask the service provider to reverse the transaction they say, the money has already been withdrawn or that you need to report to the police.

The Act now makes it a crime for someone to intentionally hide or detain electronic payment delivered to the person in error and which ought to be delivered to another person.

mobile money cyber crime

Also, any person who, with intent to defraud, sends electronic messages, instructions, subscribes any electronic messages or instructions commits an offence.

Data Protection

The law allows for information sharing between owners of critical infrastructure. However, it limits the sharing of health status information without consent of the data subject which is a fundamental data protection principle.

Employee Responsibility

As most of our readers are in the tech industry and their businesses are fundamentally driven by computer systems, this provision is of interest. Employees are expected to relinquish all codes and access rights to their employer’s computer network or system immediately upon termination of employment.

Criminal Offences

Most of the offences in the law had already been in place under the current Kenya Information and Communications Act (KICA). These include unauthorized access, unauthorized interference, accessing computer systems with intent, Unauthorized disclosure of password or access codes

Of the legacy offences, what is fundamentally different is that the penalties now are much higher from 5 to 20 million or imprisonment of around five (5) years. Normally, the idea behind criminal law such as this, is to act as a deterrent to stop people from committing such offence. That’s why the penalties are as punitive.

The penalties for the legacy offences are even higher for interfering with systems that contain highly sensitive and classified information such as those for security, defense and critical infrastructure.

Problematic Provisions

Several groups have come up against the new law; these include civil society organizations such as Article 19, the Media Council of Kenya, the Public Interest Litigation arm of the law society and the Bloggers Association of Kenya.

One of the common concerns are the offences relating to fake news. The law provides that “A person who knowingly publishes information that is false in print, broadcast, data or over a computer system, that is calculated or results in panic, chaos, or violence among citizens of the Republic, or which is likely to discredit the reputation of a person commits an offence and shall on conviction, be liable to a fine not exceeding five million shillings or to imprisonment for a term not exceeding ten years, or both.”

A famous court decision of Republic v Geoffrey Andare had the impact of declaring section 29 of the Communications Act (KICA) unconstitutional because the section was vague and too broad. In my personal opinion, this is a problematic section and it doesn’t meet the Constitutional threshold of laws.

Another section is that of cyber harassment where one communicates to another with the effect of causing apprehension or causing detrimental effect. As a woman actively online and in the tech community, I know of so many people, ladies especially, but also men, who have been harassed online because of the false perception of online anonymity. It is a problem that needs to be addressed.

Another key issue is the investigative procedures of the law and the powers that the law gives to the police. It talks of an “authorised person” being an officer in a law enforcement agency or a cybersecurity expert designated by the Cabinet Secretary of Interior. It would be interesting to see who these “experts” shall be.

Generally, we all know that we need a law to protect users in the internet and tech age. How the law was largely framed was identifying the problem and then backtracking to put it into words. All lawyers know that the translation matrix from English to Legalese and vice versa is not a simple task.

Also, if I may, most of the people complaining about this law are people who did not contribute to the law-making process and did not give any thoughts during the extensive public participation process from 2016. Granted, a number of aggrieved stakeholders did, myself included, but most Kenyans, truth be told, did not.

In my opinion, the law is timely and is needed. Some sections are problematic and need to be corrected. I’m waiting to see how it all plays out.

SendShare149Tweet93
June Okal

June Okal

'I speak legalese, understand the tech and hack the law.' June Okal is a legal professional in Technology, Media and Telecommunications Law Practice and Co - Organizer of Nairobi Legal Hackers. Her focus areas are Innovation, Intellectual Property and Internet Governance.

Related Posts

Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025

Latest

Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

Starlink Is Expanding in Africa Through New Airtel Partnership

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.