GET /api/v0.1/hansard/entries/785598/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 785598,
    "url": "https://info.mzalendo.com/api/v0.1/hansard/entries/785598/?format=api",
    "text_counter": 77,
    "type": "speech",
    "speaker_name": "Hon. Musimba",
    "speaker_title": "",
    "speaker": {
        "id": 1804,
        "legal_name": "Patrick Mweu Musimba",
        "slug": "patrick-mweu-musimba"
    },
    "content": "indicating a completely different person altogether from you.” This is the seriousness of the information which we have. It goes as far as getting into your bank accounts. Your entire identity being threatened means your life is irreparably destroyed. There are no curative measures that will come back to you because by the time we have already moved to an e-government platform or taken our things to databases, if we do not have the right security measures, you can suffer irreparably. This is because anywhere you go, authentication is not there. Hon. Speaker, within this House, you ably guided us that the process of making our Bills ends up in printing that Bill on a goatskin because it will not be erased from record. It cannot be manipulated. It envisions that this Bill can go into an electronic version and something can happen to it, the way we key into our computers law reports, which is our quick reference to what the law says. This can be subject to manipulation if somebody attacks and infringes into the system. It was important for me to lay that groundwork in terms of understanding where the place of cyber and computer crimes is so that we can understand that as we move on to make the amendments which we want to propose, we can see it from that light. We need to know that an attack from the cyber space can be from a person to person or person to business. This is where individuals attack products and recently you saw even on social media a commodity as precious as chocolate was being attacked. They were saying somebody has infected chocolate with the Human Immunodeficiency Virus (HIV). That would devastate a company because what Public Relations campaign will you run to show that your processes are, indeed, safe and that the candy or milk that you are going to consume is safe? There is business to person. Businesses can, indeed, attack individuals. This is the space of innovation. If we do not understand the innovation space, it is easy for a business to say how it is possible for a young guy to invent say, a helicopter. They question the expertise you have and they are able to enter into the records and prove that the intellectual property rights that are as a result of that particular innovation belong to those companies. Through the social media platforms or, indeed, the information age, they can make this person even face serious charges in court. The other aspect is business to Government. Businesses can injure governments. They can undermine their very regulations that they stand on. This is all through the usage of computers. We have seen very successful campaigns being launched in a very emotive way that undermines the government in place. There is also government to government cyberspace attack. Governments rise against each other. You have seen these attacks between Russia and North Korea, North Korea and Pakistan, and Pakistan and India. This is the biggest concern. Even right now in the last one week, you saw a flurry of activities within the diplomatic channels of people who expelled each other. This is as a result of cyber-related crimes that nations are facing."
}