• Latest
  • All
  • How To
Computer Misuse & Cybercrimes Act , ministry calls for public comments

Computer Misuse & Cybercrimes Regulations: Call for Public Comments

August 30, 2023
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
DHgate Tablet Cases deals
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Computer Misuse & Cybercrimes Regulations: Call for Public Comments

Sakwa Kombo by Sakwa Kombo
August 30, 2023
in News
Reading Time: 2 mins read
264
0
Computer Misuse & Cybercrimes Act , ministry calls for public comments

The Cabinet Secretary for Interior and National security is inviting comments from the public on the draft Computer Misuse & Cybercrimes regulations 2023. A taskforce appointed by the ministry in May this year has successfully formulated the draft regulations.

Hence, the Taskforce invites institutions, organizations and individuals to submit their comments. The public participation phase is an important step and a constitutional requirement.

The public are advised to share their comments and submissions via email or to hand deliver to the taskforce secretariat at Harambee house. In addition, Taskforce will hold open citizen engagement forums in eight regions across the country. You may view the different venues, email and physical address here.

Notably, this call for submissions runs from 29th  August to 19th September 2023.

Computer Misuse & Cybercrimes Regulations 2023 Objectives

Of the note, the draft regulations primarily focus on the following items:

  • Provide a framework to monitor, detect and respond to cybersecurity threats in the cyberspace belonging to Kenya.
  • Provide for frameworks for establishment and management of Cybersecurity Operations Centres.
  • Provide for protection, preservation and management of critical information infrastructure.
  • Provide for audit and inspection of national critical information infrastructure.
  • Provide for recovery plans in the event of a disaster, breach or loss of national critical information infrastructure or any part of it.
  • Provide a framework for capacity building on prevention, detection and mitigation of computer and cybercrimes and matters connected.
  • Promote coordination, collaboration, cooperation and shared responsibility amongst stakeholders in the cybersecurity sector including critical infrastructure protection.
  • Provide for mechanisms for cybercrime management among others.

The heavy focus on cybersecurity will be welcome given recent reports that critical systems and infrastructure in Kenya have been subject to cyber-attacks in recent weeks. In addition physical infrastructure have been subject to attacks by bad actors eg. Al shabaab

Another item worth noting is the provision for regulatory frameworks to manage the National Public Key Infrastructure (NPKI). The taskforce is the first to formulate policies and standards for the NPKI.

The NPKI refers to a system for the creation, storage, and distribution of digital certificates which are used to verify the online identities of individuals or institutions.

Tags: Cybersecurity
SendShare147Tweet92
Sakwa Kombo

Sakwa Kombo

My Bio is in my written articles.

Related Posts

apple trump

Apple Warns iPhone Users in 100 Countries of Targeted Spyware Attacks

May 6, 2025
KICTANet Cybersecurity Memo

KICTANet Pushes for Changes to Kenya’s Draft Cybersecurity Strategy

April 26, 2025
Web DDOS Tsunami Attack

Web DDoS Tsunamis Are the Next Big Cyber Threat to Organizations

April 25, 2025
MTN Reports Data Breach Affecting Some Customers

MTN Hacked: Customer Data Exposed in Certain Regions

April 25, 2025
phishing emails

Hackers Now Sending Phishing Emails From “[email protected]”

April 22, 2025
Hospitals Targeted by Stealthy New Malware Called ResolverRAT

Hospitals Targeted by Stealthy New Malware Called ResolverRAT

April 15, 2025

Latest

Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

Starlink Is Expanding in Africa Through New Airtel Partnership

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.