[Cyber-security-tech-mw-l] Cyber Security Strategy Draft Log Frame

Khumbo Kasambara kkasambara at macra.org.mw
Wed Jan 11 16:08:55 CAT 2017


My Observations:
Strategic Goal - 4:     Enable the safety of vulnerable groups in cyberspace, especially the safety of children:

In previous deliberations it was noted that women need no special attention and preference online because of a number of factors:
1.  Online content is open to both men and women; hence misuse of such content is not restricted to gender
2.  Technology sees no boundary, i.e. there is no such technology for women only or men only, cybercrimes can be perpetrated by either gender, for instance security officers highlighted high online misuse by women
3.  Physical stature of people does not guarantee same online presence. For instance, a person can be bullied by a lesser person that may include women (with better knowledge and skills) online.

In general, under that strategic goal, through all specific goals and actions women need no special attention like children.

On the other hand, children need to be protected because:
Majority of online content has plenty of obscenity, sacrilege, vulgar, nudity and others that may affect children the rest of their lives.


Strategic Goal - 5:     Enhance the fight against cybercrime

There is need to harmonize efforts in handling of digital evidence by private Investigators and those serving the public, for instance the Police. Digital forensics may be well managed as a collaborative continuous effort with players like law enforcement agencies, Private Investigators, private institutions.

SOPs and Frameworks are required as guiding principles.


This is my little contribution.



-----Original Message-----
From: Cyber-security-tech-mw-l [mailto:cyber-security-tech-mw-l-bounces at sdnp.org.mw] On Behalf Of Christopher Banda
Sent: Tuesday, January 10, 2017 9:07 AM
To: cyber-security-tech-mw-l at sdnp.org.mw
Subject: Re: [Cyber-security-tech-mw-l] Cyber Security Strategy Draft Log Frame

All
this is last reminder as we are closing receiving comments today on the issue and kindly  let's send so that we forward to the  Consultant

Thanks

Christopher

-----Original Message-----
From: Cyber-security-tech-mw-l [mailto:cyber-security-tech-mw-l-bounces at sdnp.org.mw] On Behalf Of Christopher Banda
Sent: Wednesday, January 4, 2017 3:27 PM
To: cyber-security-tech-mw-l at sdnp.org.mw
Subject: [Cyber-security-tech-mw-l] Cyber Security Strategy Draft Log Frame
Importance: High

All
Kindly be reminded of the comments on the attached draft log frame which was drafted during last workshop. take note that the deadline to receive  comments is 10 January 2017 and we await your comments.


Thanks
Christopher Banda
........................................ This e-mail and its attachments contain confidential information from MACRA, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it.
........................................ This e-mail and its attachments contain confidential information from MACRA, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it.

_______________________________________________
Cyber-security-tech-mw-l mailing list
Cyber-security-tech-mw-l at sdnp.org.mw
http://chambo3.sdnp.org.mw/mailman/listinfo/cyber-security-tech-mw-l
........................................ This e-mail and its attachments contain confidential information from MACRA, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it.



More information about the Cyber-security-tech-mw-l mailing list