Business professionals analyzing data on laptop and tablet, data governance meeting, African business team collaboration, corporate data management, Data Governance Africa.

Webinar Recap: Understanding Kenya’s Computer Misuse and Cybercrimes Act (2018)

Hosted by the Data Privacy and Governance Society of Kenya (DPGSK)

Key Topics Covered:

  1. Unauthorized Access to Data Systems
  2. Cyber Harassment & Cyber Terrorism
  3. Social Media Regulation & Privacy
  4. Current Issues & Case Studies

1. Unauthorized Access to Data Systems

What is it?

  • Accessing computer systems/data without permission (e.g., hacking, guessing passwords).
  • Examples: Government database breaches, employees misusing work system access.

Legal Framework:

  • Section 14 of the Act: Penalties include fines up to KSh 5M or 3 years imprisonment.
  • Critical Infrastructure: New regulations (2024) require annual risk assessments, appointment of Chief Information Security Officers (CISOs), and incident reporting.

Challenges:

  • Laws exist, but enforcement is weak. Many organizations handle breaches internally instead of prosecuting.
  • Solution: Better technical safeguards (e.g., multi-factor authentication, firewalls).

2. Cyber Harassment & Cyber Terrorism

Cyber Harassment (Section 27):

  • Broadly defined as online communication causing fear, offense, or harm.
  • Forms: Doxing, trolling, cyberstalking, internet mobs (e.g., “Buyer Beware” groups).
  • Criticism: Vague terms like “indecent” risk suppressing free speech.

Cyber Terrorism (Section 33):

  • Using tech to promote terrorism (e.g., radicalization via social media).
  • Overlap: Duplicates parts of the Prevention of Terrorism Act, creating confusion.

Case Example:

  • Republic v. Bigus: Conviction for abusive messages led to a KSh 100K fine (vs. potential KSh 20M under the Act).

3. Social Media Regulation & False Information

False Publication (Section 22):

  • Punishes sharing false info online (fine up to KSh 5M or 2 years jail).
  • Issue: Hard to verify “falsity”; risks stifling satire/opinion (e.g., memes of politicians).

Artistic Expression vs. Crime:

  • Debate: Are edited images (e.g., a president in a coffin) protected as art or punishable?
  • Gap: Kenya lacks laws like the EU’s Digital Services Act to regulate platforms (e.g., Meta, X).

Recent Cases:

  • Rose and Jerry: Charged for “interfering” with Parliament’s email system via mass submissions. Critics argue this mirrors lawful petitions.

4. Current Challenges & Reforms

Emerging Issues:

  • AI Misuse: Deepfakes, non-consensual image editing (e.g., “undressing” tools).
  • Accountability: Social media giants (e.g., X, Facebook) lack local offices, complicating justice for users.

2024 Amendments:

  • Added “SIM swap fraud” as an offense.
  • Expanded cyber harassment to include incitement to suicide.
  • Room for Improvement: Still overlaps with other laws; needs clearer definitions.

Call to Action:

  • Advocate for precise laws balancing security and free speech.
  • Push for platform accountability (e.g., mandatory local offices for Meta/X).

Final Thoughts

  • DPGSK’s Role: Hosts monthly discussions to educate on digital rights.
  • Participate: Join future sessions or contact DPGSK to share insights.

Quote from Panelist:
“Laws must evolve with tech—but not at the cost of silencing legitimate dissent.”


Tags:
I O

I O

Ian Olwana supports African organisations in turning data protection laws into practical, sustainable governance practices.

http://datagovernance.africa

Leave a Reply

Your email address will not be published. Required fields are marked *