Posts Tagged: Information Technology

Insights, analysis, and commentary on intellectual property, information technology law, and digital policy in Africa, filtered by the topic "Information Technology".


THE CONTROVERSY SURROUNDING END-TO-END ENCRYPTION AMONG MESSAGING APPS

By Margaret Zalo A lot of information is shared back and forth on messaging platforms on a daily basis. While governments have an incentive to monitor...

Read More

Technology and COVID-19 in the Kenya Judicial System

As Kenya joins the rest of the world in fighting the novel coronavirus (Covid-19) , various measures have been introduced affecting our day to day...

Read More

Technology and COVID-19 in the Kenya Judicial System

By Florence Ogonjo Introduction. As Kenya joins the rest of the world in fighting the novel coronavirus (Covid-19) , various measures have been introduced affecting our...

Read More

DATA JUSTICE DISCUSSION WITH LINNET TAYLOR

The Centre of Intellectual Property and Technology (CIPIT) had the honour of hosting a Global Data Justice seminar on the 18thof February 2020 at Strathmore...

Read More

The Computer Misuse and Cybercrimes Act Judgment: A Digest

Snapshot of the judgement Issue Finding of the court That the two-thirds gender rule would not be met in the National Computer and Cybercrimes Co-ordinationCommittee...

Read More

Digital surveillance in health emergencies

Like many of her African counterparts, Kenya faces unique challenges and opportunities in battling the Coronavirus. Due to high unemployment, many people survive on income...

Read More

The Draft Registration of Persons (NIIMS) Regulations 2020

Following the judgement in the case of Nubian Rights Forum & 2 others v Attorney General & 9 others (Huduma Namba case), the Ministry of...

Read More

COMMENTARY ON THE DRAFT DATA PROTECTION (CIVIL REGISTRATION) REGULATIONS 2020.

The regulations are divided into six parts covering respectively; Preliminary, Data Protection Principles, Rights of the data subject, Obligations of the civil registration entity, Security...

Read More

FIFTH GENERATION CELLULAR NETWORK (5G): LIMITLESS POTENTIAL AND INHERENT VULNERABILITIES

At the dawn of the new decade, perhaps the most anticipated technological breakthrough is not the progress of autonomous vehicles or the onset of smart...

Read More

Stay Updated

Subscribe to our newsletter to receive the latest research, publications, and blog posts directly in your inbox.