[Cyber-security-tech-mw-l] Communications Act - revised - Re: Cyber Security Strategy Draft Log Frame - safety of vulnerable groups

Dr Paulos Nyirenda paulos at sdnp.org.mw
Mon Jan 16 19:51:55 CAT 2017


On 13 Jan 2017 at 9:35, Christopher Banda wrote:

> All
>
> attached is the New Communications Act. Am yet to get the
> E-Transaction and Cyber security Act and will do the same to you all 

Thanks, I look forward to seeing a copy of the E-Transactions and Cyber Security Act.

It seems some sections of your submitted copy of the Communications Act may not have
been coverted to PDF properly or need editing such as parts that follow after Section 8
(4). It is my hope that the Gazetted copy will be more complete.

Regards,

Dr Paulos B Nyirenda
NIC.MW & .mw ccTLD
http://www.registrar.mw



> 
> Thanks
> 
> christopher
> 
> -----Original Message-----
> From: Cyber-security-tech-mw-l [mailto:cyber-security-tech-mw-l-bounces at sdnp.org.mw]
On Behalf Of Dr Paulos B Nyirenda
> Sent: Thursday, January 12, 2017 10:02 AM
> To: cyber-security-tech-mw-l at sdnp.org.mw
> Subject: Re: [Cyber-security-tech-mw-l] Cyber Security Strategy Draft Log Frame -
safety of vulnerable groups
> 
> 
> I recall that the issue of "safety of vulnerable groups in cyberspace, especially the
safety of children"  is very well covered in the Malawi Electronic Transactions and
Cyber Security Act that we have been told has now been assented to and hence should be
followed in developing the strategy
> 
> Is the Act now available for public use?
> 
> There were quite a few proposals for ammendments and  a lot of debate in Parliament on
sections on this topic and we need to see the exact text in the passed Act
> 
> Has it been gazzetted yet?
> 
> Regards,
> 
> Paulos
> ======================
> Dr Paulos B Nyirenda
> NIC.MW & .mw ccTLD
> http://www.registrar.mw
> 
> 
> On 11 Jan 2017 at 14:08, Khumbo Kasambara wrote:
> 
> > My Observations:
> > Strategic Goal - 4:     Enable the safety of vulnerable groups in cyberspace,
especially the safety of children:
> >
> > In previous deliberations it was noted that women need no special attention and
preference online because of a number of factors:
> > 1.  Online content is open to both men and women; hence misuse of such
> > content is not restricted to gender 2.  Technology sees no boundary,
> > i.e. there is no such technology for women only or men only, cybercrimes can be
perpetrated by either gender, for instance security officers highlighted high online
misuse by women 3.  Physical stature of people does not guarantee same online presence.
For instance, a person can be bullied by a lesser person that may include women (with
better knowledge and skills) online.
> >
> > In general, under that strategic goal, through all specific goals and actions women
need no special attention like children.
> >
> > On the other hand, children need to be protected because:
> > Majority of online content has plenty of obscenity, sacrilege, vulgar, nudity and
others that may affect children the rest of their lives.
> >
> >
> > Strategic Goal - 5:     Enhance the fight against cybercrime
> >
> > There is need to harmonize efforts in handling of digital evidence by private
Investigators and those serving the public, for instance the Police. Digital forensics
may be well managed as a collaborative continuous effort with players like law
enforcement agencies, Private Investigators, private institutions.
> >
> > SOPs and Frameworks are required as guiding principles.
> >
> >
> > This is my little contribution.
> >
> >
> >
> > -----Original Message-----
> > From: Cyber-security-tech-mw-l
> > [mailto:cyber-security-tech-mw-l-bounces at sdnp.org.mw] On Behalf Of
> > Christopher Banda
> > Sent: Tuesday, January 10, 2017 9:07 AM
> > To: cyber-security-tech-mw-l at sdnp.org.mw
> > Subject: Re: [Cyber-security-tech-mw-l] Cyber Security Strategy Draft
> > Log Frame
> >
> > All
> > this is last reminder as we are closing receiving comments today on
> > the issue and kindly  let's send so that we forward to the  Consultant
> >
> > Thanks
> >
> > Christopher
> >
> > -----Original Message-----
> > From: Cyber-security-tech-mw-l
> > [mailto:cyber-security-tech-mw-l-bounces at sdnp.org.mw] On Behalf Of
> > Christopher Banda
> > Sent: Wednesday, January 4, 2017 3:27 PM
> > To: cyber-security-tech-mw-l at sdnp.org.mw
> > Subject: [Cyber-security-tech-mw-l] Cyber Security Strategy Draft Log
> > Frame
> > Importance: High
> >
> > All
> > Kindly be reminded of the comments on the attached draft log frame which was drafted
during last workshop. take note that the deadline to receive  comments is 10 January
2017 and we await your comments.
> >
> >
> > Thanks
> > Christopher Banda
> > ........................................ This e-mail and its attachments contain
confidential information from MACRA, which is intended only for the person or entity
whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient(s) is prohibited. If you
receive this e-mail in error, please notify the sender by phone or email immediately and
delete it.
> > ........................................ This e-mail and its attachments contain
confidential information from MACRA, which is intended only for the person or entity
whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient(s) is prohibited. If you
receive this e-mail in error, please notify the sender by phone or email immediately and
delete it.
> >
> > _______________________________________________
> > Cyber-security-tech-mw-l mailing list
> > Cyber-security-tech-mw-l at sdnp.org.mw
> > http://chambo3.sdnp.org.mw/mailman/listinfo/cyber-security-tech-mw-l
> > ........................................ This e-mail and its attachments contain
confidential information from MACRA, which is intended only for the person or entity
whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient(s) is prohibited. If you
receive this e-mail in error, please notify the sender by phone or email immediately and
delete it.
> >
> > _______________________________________________
> > Cyber-security-tech-mw-l mailing list
> > Cyber-security-tech-mw-l at sdnp.org.mw
> > http://chambo3.sdnp.org.mw/mailman/listinfo/cyber-security-tech-mw-l
> >
> >
> > -----
> > No virus found in this message.
> > Checked by AVG - www.avg.com
> > Version: 2016.0.7996 / Virus Database: 4749/13746 - Release Date:
> > 01/11/17
> >
> 
> 
> _______________________________________________
> Cyber-security-tech-mw-l mailing list
> Cyber-security-tech-mw-l at sdnp.org.mw
> http://chambo3.sdnp.org.mw/mailman/listinfo/cyber-security-tech-mw-l
> ........................................ This e-mail and its attachments contain
confidential information from MACRA, which is intended only for the person or entity
whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient(s) is prohibited. If you
receive this e-mail in error, please notify the sender by phone or email immediately and
delete it.
> 


----------------------------------------------------------
Malawi SDNP Webmail: http://www.sdnp.org.mw
Access your Malawi SDNP e-mail from anywhere in the world.
----------------------------------------------------------



More information about the Cyber-security-tech-mw-l mailing list