GET /api/v0.1/hansard/entries/291055/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 291055,
    "url": "https://info.mzalendo.com/api/v0.1/hansard/entries/291055/?format=api",
    "text_counter": 93,
    "type": "speech",
    "speaker_name": "Mr. Khaniri",
    "speaker_title": "The Assistant Minister for Information and Communications",
    "speaker": {
        "id": 171,
        "legal_name": "George Munyasa Khaniri",
        "slug": "george-khaniri"
    },
    "content": " Mr. Speaker, Sir, I beg to reply. (a) The monitoring system being implemented by the CCK is an initiative of the Kenya Computer Incident Response Team Coordination Centre, a function of the CCK whose mandate is to offer advice on cyber security matters nationally, and to coordinate response to cyber incidents in collaboration with relevant stakeholders. The purpose of monitoring the system is to assist in early detection and prevention of cyber crime incidents, which is a proactive approach to managing cyber crime. The system monitors internet traffic to detect any potential cyber threats or any bad things happening on the internet. It is intended to benefit internet users, internet providers and the general public by protecting them from cyber criminals. It is a passive system and not a tool for spying on users. Further, the system cannot be used to block access to internet at all. It should also be noted that there is a very thin line between privacy and security. In order to reap the benefits of the internet and information resources in general, the Government must endeavour to ensure that the online platforms used by the public are secure. This, in one aspect, therefore, calls for monitoring data traffic in order to identify any potential threats at the earliest instance thus enabling us to put in place appropriate and timely response measures. Mr. Speaker, Sir, just like the physical security measures we have to put in place as a result of the current threat from the terrorist network, online security can tend to have a certain level of intrusion into people’s personal privacy presenting a circumstance where security management overrides privacy. Take for example, the war with AlShabaab where the Government has sent troops to protect Kenya’s borders with Somalia. Such a measure translates to physical protection of our borders. This, however, leaves our online borders open to exploitation by any would be cyber attackers. Best practice requires us to put in place measures that not only react but also importantly detect and prevent any cyber incident from happening. The war on terror has compelled the world to intrude into personal privacy. People are now being frisked at the airport, public malls, churches, banks and other public shared areas as a preventive measure. The online world is no exception as terrorist groups are now using the internet as a form of communication and as a platform for planning attacks. It is, therefore, imperative that we put in place measures that are also digitally frisk online platforms for any potential attacks. (b)To ensure the privacy of Kenyans who use mobile phones and communicate on social media is not infringed, the Communications Commission of Kenya (CCK) intends to sign non-disclosure agreements with partner organizations clearly stipulating that the data gathered will be used for intended purpose only. The reverse applies where partner organizations will be required to adhere to strict confidentiality agreements. On a more general note, the Kenya Computer Incident Response Team Coordination Centre will have the necessary guidelines for handling citizen confidential information. (c)The Kenya Information and Communications Act, Cap.411 (a) mandates the CCK to establish a national cyber security framework. The policy is anchored on Kenya’s ICT sector policy of 2006. As such, the Commission is both mandated and guided by the national policy, our laws and resultant regulations. The monitoring system is a component of Kenya’s national cyber security framework and in the case of any infringement of any rights of Kenyans, then such cases will be handled in line with existing related legal instruments and provisions. Thank you."
}