Treatment of Kenya's Internet Intermediaries under the Computer Misuse and Cybercrimes Act, 2018

Authors

DOI:

https://doi.org/10.23962/10539/26114

Keywords:

Computer Misuse and Cybercrimes Act, Kenya, internet intermediaries, intermediary liability, cybercrime

Abstract

Kenya has this year enacted the Computer Misuse and Cybercrimes Act, 2018. This article reviews the Act from the perspective of internet intermediaries, with a view to establishing the impact the Act is expected to have on intermediaries' operations. The article outlines key concerns regarding the Act's provisions in respect of obligations and liabilities of intermediaries, particularly with regard to obligations to support state agencies. Recommendations are made for how the Act could be amended to cater more optimally to both state and intermediary concerns.

References

Article 19. (2013). Internet intermediaries: Dilemma of liability. Retrieved from https://www.article19.org/wp-content/uploads/2018/02/Intermediaries_ENGLISH.pdf

Best, M. L. (2004). Can the internet be a human right? Human Rights C Human Welfare, 4(1), 22–31.

Business Daily. (2018, April 6). Two men charged with hacking into Safaricom system. Retrieved from https://www.businessdailyafrica.com/corporate/Two-men-charged-with-hacking-Safaricom-system/539550-3880240-140vv0az/index.html

Cheeseman, N. (2008). The Kenyan elections of 2007: An introduction. Journal of Eastern African Studies, 2(2), 166–184. https://doi.org/10.1080/17531050802058286 DOI: https://doi.org/10.1080/17531050802058286

Communications Authority of Kenya (CAK). (2017). First quarter sector statistics report for the financial year 2017/2018 (July-September 2017). Retrieved from http://www.ca.go.ke/index.php/statistics

Council of Europe (2001). Convention on Cybercrime (Budapest Convention).

Dinwoodie, G. B. (Ed.). (2017). Secondary liability of internet service providers. Springer. https://doi.org/10.1007/978-3-319-55030-5 DOI: https://doi.org/10.1007/978-3-319-55030-5

Englander, E., Donnerstein, E., Kowalski, R., Lin, C. A., & Parti, K. (2017). Defining cyberbullying. Pediatrics, 140(Supplement 2), S148–S151. doi:10.1542/peds.2016-1758u DOI: https://doi.org/10.1542/peds.2016-1758U

George Andare v the Attorney General C 2 Others [2016] eKLR, High Court of Kenya.

Gürkaynak, G., Yılmaz, İ., & Durlu, D. (2013). Understanding search engines: A legal perspective on liability in the Internet law vista. Computer Law C Security Review, 29(1), 40–47. https://doi.org/10.1016/j.clsr.2012.11.009 DOI: https://doi.org/10.1016/j.clsr.2012.11.009

Hornik, J., & Villa llera, C.(2017). An economic analysis of liability of hosting services: Uncertainty and incentives online. Bruges European Economic Research Papers 37/2017.

International Telecommunication Union (ITU). (2017) Global cybersecurity index. Geneva. Kerr, I. R., & Gilbert, D., (2004). The role of ISPs in the investigation of cybercrime. In T. Mendina, & J. L. Britz (Eds.) (2004), Information ethics in an electronic age: Current issues in Africa and the world (pp. 163–172). Jefferson, NC: McFarland and Company.

Kerr, O. S. (2005). Search warrants in an era of digital evidence. Mississippi Law Journal, 75(1), 85–145.

Kreimer, S. F. (2006). Censorship by proxy: The First Amendment, internet intermediaries, and the problem of the weakest link. University of Pennsylvania Law Review, 155(1), 11–101. https://doi.org/10.2307/40041302 DOI: https://doi.org/10.2307/40041302

Kurbalija, J. (2016). An introduction to internet governance. Switzerland: Diplo Foundation.

MacKinnon, R., Hickok, E., Bar, A., & Lim, H. I. (2015). Fostering freedom online: The role of internet intermediaries. Paris: UNESCO.

Mittal, I. P. S., & Sharma, P. (2017). A review of international legal framework to combat cybercrime. International Journal of Advanced Research in Computer Science, 8(5), 1372–1374. https://doi.org/10.2139/ssrn.2978744 DOI: https://doi.org/10.2139/ssrn.2978744

Ndemo, B., & Weiss, T. (Eds.) (2016). Digital Kenya: An entrepreneurial revolution in the making. Springer. https://doi.org/10.1057/978-1-137-57878-5 DOI: https://doi.org/10.1057/978-1-137-57878-5

Perset, K. (2010). The economic and social role of internet intermediaries. Paris: OECD. https://doi.org/10.1787/5kmh79zzs8vb-en DOI: https://doi.org/10.1787/5kmh79zzs8vb-en

Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Washington, DC: Pew Research Center.

Republic of Kenya. (1963). Evidence Act, 1963.

Republic of Kenya. (1998a). Kenya Communications Act, 1998.

Republic of Kenya. (1998b). Kenya Information and Communications Act (KICA), 1998. Republic of Kenya. (2001). Mutual Legal Assistance Act, 2001.

Republic of Kenya. (2006). Sexual Offences Act, 2006.

Republic of Kenya. (2008a). Kenya Information and Communications Act, 2008. Retrieved from http://www.ca.go.ke/index.php/sector-legislation

Republic of Kenya. (2008b). National Cohesion and Integration Act, 2008. Retrieved from http://www.kenyalaw.org/lex/actview.xql?actid=No.%2012%20of%202008

Republic of Kenya. (2010). Constitution of Kenya, 2010. Retrieved from http://kenyalaw.org/kl/index.php?id=398

Republic of Kenya. (2013). Kenya Information and Communications (Amendment) Act, 2013. Retrieved from http://www.ca.go.ke/index.php/sector-legislation

Republic of Kenya. (2018). Computer Misuse and Cybercrimes Act, 2018. Retrieved from http://kenyalaw.org/kl/fileadmin/pdfdownloads/Acts/ComputerMisuseandCybercrimesActNo5of2018.pdf

Serianu, K. (2017). Cybersecurity report 2017: Demystifying Africa’s cyber security poverty line.

Retrieved from http://www.serianu.com/resources.html

Sloot, B. (2015). Welcome to the jungle: The liability of internet intermediaries for privacy violations in Europe. J. Intell. Prop. Info. Tech. C Elec. Com. L., 6(3), 211–228.

Technology Coalition.(2015).Employeeresilienceguidebookforhandlingsexualexploitationimages. Retrieved from http://www.technologycoalition.org/wp-content/uploads/2015/01/TechnologyCoalitionEmployeeResilienceGuidebookV2January2015.pdf

Truyens, M., & Van Eecke, P. (2016). Liability of domain name registries: Don’t shoot the messenger. Computer Law C Security Review, 32(2), 327–344. https://doi.org/10.1016/j.clsr.2015.12.018 DOI: https://doi.org/10.1016/j.clsr.2015.12.018

Downloads

Published

22-11-2018

Issue

Section

Research Articles

How to Cite

Walubengo, J. and Mutemi, M. (2018) “Treatment of Kenya’s Internet Intermediaries under the Computer Misuse and Cybercrimes Act, 2018”, The African Journal of Information and Communication (AJIC) [Preprint], (21). doi:10.23962/10539/26114.
Views
  • Abstract 284
  • PDF 146