Joel Okomoli 0:03 I hope you can hear me well, maybe we get some confirmation across both. Thank you, Erwin. Yes we can hear you. Thank you very much. Thank you. Hi Connie Are you. Thank you, Paul. Joel Okomoli 0:38 Thank you, Paul. Paul. Paul cloggy Yeah, thank you very much. Okay, since we have a very short time. And I can see, okay, I've seen Megan Calgary welcome Megan. We have Polke long I'm waiting for Vincent I think it should be joining Shurtleff. I've been sent, if you aren't. So big up so we know you're in the house. All right. Hi Edward. Thank you kindly mute yourself. Yes, thank you. Joel Okomoli 1:37 Thank you very much and feel welcome. So because we have a very short time. I will take this opportunity to start us off. My name is Joel Kamali chapter treasurer and finance officer in the house we have our hosts the area manager, Mr. Victor Dona, and we also have our chapter. Secretary General, Sahara pudo, so press off, and then I'll give them a minute each to say hello before we go on to the session. So Joel Okomoli 2:19 we would welcome a word of prayer, recording in progress. Particularly start with a word of prayer. As I share my screen. Joel Okomoli 2:52 All right, just this time we didn't mention the house I can see you can you pray for us. Mensa mensen if you can hear me. I'll find our Vice President. Hi, good. Definitely. Good afternoon to you. Yes. You can be iPhone sleep as an hour or Alphonce Odhiambo 3:33 less believe I'm praying. Alphonce Odhiambo 3:39 Thank you Lord for this opportunity. Alphonce Odhiambo 3:43 We pray that you believe as we start this meeting. We call for your presence, and we ask you to intervene in that regard I do pray short and believe in the name of Jesus Christ our Lord. Amen. Joel Okomoli 3:59 Thank you very much. And thank you all for taking time to attend this session. It's a really present a real pleasure to host you. This afternoon, or morning for some of our colleagues. Joel Okomoli 4:15 Like I said, my name is Joel Kamala. And this is ISOC Kenya chapter, our first session is on encryption. We have friends who are supporting us in the house, so I will take about three minutes to allow our word from each of them. So let me start by welcoming our regional manager, Mr. Nan, if you're still around, Victor. Victor Ndonnang 4:46 Yes. Do I thank you. Unknown Speaker 4:48 I'm still around, I'm just, I'm listening, I'm just wishing you a very successful webinar, and congratulations again for this initiative. We are truly happy to see how you can translate our, Unknown Speaker 5:05 Our global project objective into local concrete activity like this, and thank you for organizing this and best wishes. Joel Okomoli 5:20 Thank you. Thank you very much Thank you Victor. I've seen Kevin Jager, one minute for you, sir. Kevin G. Chege 5:32 Hi, Joel Hi everyone thanks for organizing the event I'm actually just here as a attendee want to learn from the presentations to be made. Thank you. Joel Okomoli 5:47 Thank you very much sir. And I feel welcome. Joel Okomoli 5:51 Actually, welcome home. Let me welcome Alphonse one minute for you sir. Alphonce Odhiambo 6:03 Thank you very much Mr Jewell, and everyone was doing the call. I think it is a pleasure to be together and share ideas. Alphonce Odhiambo 6:14 One of the fundamentals team. and I'm also hoping that we learn much for this program. And we talk about global chapter ISOC for supporting us, is also just to mention we will not have a president. In this call right now. I hope everything you do well, and the feel. I will come on to children at home, and feel free to share and ask questions where possible. Thank you, Mister. Joel Okomoli 6:56 Thank you very much. Thank you Alphonse that was Vice President, Vice Chair for ISOC in a chapter. Joel Okomoli 7:04 The last one minute to our SG, Mr rapida. Welcome, sir. Hawi Rapudo 7:12 Okay, Thank you very much, everybody that has joined us today want to thank you for taking the time to join this encryption will not. Hawi Rapudo 7:26 So we can call to the ISOC global Victor and COVID are also doing them some of the team for the support. One of the things that we're also very keen about this is, this part of our action plan for 22. And part of the webinars, the issues that will come out of be used for developing our scope, the next agenda. Thank you so much. Joel Okomoli 7:59 Thank you very much, and thanks for sticking to our time slots, those officials and the chapter leaders, I know that you will take your time to reach out to them and consult where necessary. As Victor had mentioned the chapter, I mean the fundamentals program for this year are the several focus areas I'm sure we've all been receiving those emails. And the aim of this program is to develop new community leaders who can work with our local chapters to not only create local awareness, but to conduct simple basic activities that will increase the level of participation increase the level of engagement with our governments, state and non state actors, and also our membership. The reason we thought we must have these webinars within this time, again, was because of the timelines that were issued. We could not host this in July, because that will be out of the timelines and our participants needed that ample time to report on their activities. So, I did not want to take a lot of time myself I want to take this opportunity to welcome our first presenter, can we make him a co host Vincent unwinder. Welcome, sir. Hawi Rapudo 9:32 Yes, a minute, so that we don't forget some of the chairs from the standing committees, since I've seen each other to know. Also, who's in charge of research. I've also seen Lumumba, who's in charge of membership. And I think, once again, thank you so much. Joel Okomoli 10:00 Yes 30 seconds for each of them, that would be great. Let's have the character guy in the house or I didn't see you. I was scrolling my participants list that he was on Sunday, Thank you so much, just doing. Thank you so much for the welcome. Richard Otieno 10:26 Thank you everyone for joining. Thank you for. Also this initiative, especially the fundamentals program participants. Unknown Speaker 10:35 Looking forward to learn and also, you know, contribute to ensuring we have a stronger, more resilient Internet for us. Thank you. Joel Okomoli 10:44 Thank you very much and we appreciate the work Ervin is doing in supporting us, especially with the publicity and the mobilization most of the members who are here, I received a very nice poster, and also links for this meeting. The session is recorded under let's welcome Vincent, I hope we'll send you already. Unknown Speaker 11:05 Hello. Yes, yes gel, I'm ready. The end. Yes I can hear you. Okay thank you. Vincent Mwando 11:15 Okay, just a second. Let me just share my screen. So, my name is Vincent wonder, member of the Kenya chapter. Vincent Mwando 11:24 I'm passionate about Internet governance and moreso in in an encryption, just a bit about me let's TI. I did the idea that to return the Youth Ambassador Program and there is the paper, the paper writing stage. And that opened in DC our coming years and he gets a chance to be a youth ambassador where can present the cadet chapter under sec and be able to have more voice, that at least we can, when some of the things we had, we wish and admired to achieve. So, just share my screen. Unknown Speaker 12:06 Okay. Unknown Speaker 12:13 Okay, so how I journal okay it's audible on your end, and as you can see my screen. Yes, I can see, I can see Thank you very much. Yes, so actually the the finding were given initiative to choose and I picked on when corruption, because I think most of us are not aware of the basic of encryption, and what are the input is aware of, of, in encryption. So yes, I will say, so this is a work between the Internet site for the middle content and the one and the Kenyan chapter in glass with the coordinators who have been assisting us. So I guess, I think, for those of us who may not know about encryption. So encryption I think most of us, just know that WhatsApp I think the end to end encryption. So encryption basically just the act of encoding, which means converting or decoding the information. So, which means this, this as this, Alexa device or a system that scrambled the data that only the target audience, the target person can be able to decrypt it. So there's a key, which is being shared between the sender and the receiver. So just as always in non nobody life, we use encryption in our sector, some of us even may not be aware, Like for example, with the current pandemic. So many things have gone to the digital space from banking from shopping from communication and to and to learning. So, first like says like the iCloud Google Drive and Amazon rely on encryption, WhatsApp, then the signal, etc, and even Amazon and do me on Alibaba, they are learning on an indication that at least. Those two are praying cannot be able to get information that the users are having. So, so this just basically I'm sure works. So, for example, let me be basic that avoid sending a message to and send a message, you will get it is up to you it's readable from your end. Then there's the it's being an extended, or an encrypted, then into a ciphertext, which is being sent to the receiver then the receiver will decrypt will will keep the message, then will be a clear message on the other end. So, which means there should be a sender and a receiver, then we will start to be have, we will have to have the in an enrollment mechanism. So, just, yeah, interesting invalid 16, the UN, the United Nations Human Rights Council had a meeting where they said that when they came up with the content that. Just like human rights, the human rights that we have just outside the digital space, we should also have them in the digital space. So when did that about the right of privacy so you we have right to privacy. Yes, on the, like, outside the ritual space and also in the digital space. So, just to read here. Yes, as you can see on the Internet that by the second session observed that the same way that people have offline must also be protected, online. It noted that the exercise of human rights. In particular, the right of freedom of expression on the Internet is an issue of increasing interest and importance and the rapid pace of technology. So just like now, the way there's so much. This there's been so much abuse. There's so much they're, like, example, the Black Lives Matter, the dance happening on Twitter, on various platforms similar platforms. So, we have the right to privacy, we have rights we have to express ourselves. Yes, we can actually speak out of the digital world. So this, this is why we can say noted ICANN that interest in the Internet as an enabler for development, innovation can be realized with the full cooperation between governments, civil society, the private sector and the technical community, and academia. So some of the recent threats to encryption, have been that become from various sectors for example government, private sector business and individuals to my end you can see on the bottom the screen, we have two pictures of Chevy. So on the left side you will see how the opponent has been hacked. When on their right side and see someone trying to pry into closed into a closed. A closed sale occlusive so encryption, just like you can have a sale, then things are safe is a bear. But when somebody can be able to actually access the information without the authority of the, of the house person or the key, then that is like prying eyes. So just some of the threats include, we have the x, x, x, x, x sigma x is example recently, they shut about it happened last year in the in the US where the FBI, the Federal Bureau of Investigation, was trying to force, Apple, pulling, so that they can be able to give a backdoor to the Apple, Apple devices. So there was an incident where Unknown Speaker 17:15 a phone was found to be in possession of someone this, there was an incident where someone was killed, but now they're saying that they aren't on the phone had photos and things which could actually help them investigate. But Apple came and said that they have no authority over the phone, only the owner has the authority. So, that they've been trying to push them to the US government to be able to give a backdoor to be able to access certain information, then also we have now third party applications, third party, communication, and stuff. So most of us when we use our normal devices, we are talking some ads, we are pulling some applications which we normally install, and we don't know what they are doing. Some of them end up paying for information, picking, like they end up being a bridge between the communication. So, if as I'm chatting somebody on WhatsApp, then a third party in get involved, then he or she will be able to get the information before we can send them there now, hacking software which was used by the in NSO group where they will be able to print information and use it for like the government was able to get information to the public, and even commit some be able to do is to have some killings which were like, through the software, they're able to prey on the information and be able to locate people. So some things are the threat to encryption. Then, just the we have the machine the middle attack. So this just like an IF leaves broken and can be other people may call it man in the middle attack, or machine the middle attack. So yes, if the dropping. Yes, they're saying it's about a third party, being involved and being able to actually see through the information which we are, which we'll be sharing between you and they, is that I get, it must be just information which is stored in your devices for example your laptop, your phones, or any other device which stores your personal information. For example, you buy, buy, buy, buy, buy, buy, buy, Buy biometrics, or maybe credit card and stuff. So what are some of the pros of encryption. So, this is an enabler to near bulletproof barrier from accessing data by an authorizing the people or persons. So yes, this I think can understand that. Once you are encrypted, then actually the person, if they receive out anybody praying does not have the key to the information, then he or she cannot be able to access the information, I can call it in, in, in layman's language for example, in that, in here in Kenya for example back then we used to store maize in granaries. So, if it was closed. Nobody could access the maize inside the granary, unless he or she was given the key to access the canary. So this is actually the essence of an encryption. Then, it enables private communication as only intended parties by the sender can access the content. So, if I'm, for example I'm me. I'm communicating with Joel, then particularly what it means that only I and Joel can give you the information. We may be communicating, when we complete, we may become communicating, and another person may not get the information. So that is some of the importance of, in the end encryption, because some of the information we share could be private and personal. Some of them could be medical data example, those who have the various health health health issues, medication and stuff. So if somebody can be able to access that information, then they can use it for various purposes that may or may not have an intended purpose. So, firstly as possible security by keeping Identity Safe and hinders people from impersonating you and getting private data, then is the cornerstone of national security, whereas government what is example, the Internet Intelligence, Treasury, all of them rely on encryption. So there is some information which is encrypted that if a third party or another party gets it, then it can be used to blackmail, it can be used to commit murder, it can be used for various reasons that was not intended. Then some of the best practices, maybe include first one is understanding the need for stoneskin and encryption. So, it is good for us to know why we will need encryption. If we are going to understand that, and that's why I always jump in my follow up that just a simple word encryption, but it has so much value before something happens to you, you may not know the infant is in production. We have our guidance, and we end up installing certain things we end up running certain applications without the information of what they're actually getting from us. And I think all of us know that information is, is money actually having information that is now, that is not, that's like currency that is now there, that's that that's mine as well. So if I have information about you, I can use it to, I can go sell it, I can go blackmail with it, I can do so many things, which then use your strongest outlook on all platforms. These days, there's no need. There's no need of me having an encrypted device for example if encrypt my, my laptop from from paper plane, then on the other end. The third party. The third party does not easy, like the second interview it must have been his maybe his or her phone or laptops are encrypted, so which means they may be safe on my end, but on the other end it won't be safe when restricting patpat applications from the amount of data, amount of data and access they have just like recently I think Apple, Apple launched the issue of the things about allowed tracking one, then also certain applications, the amount of data you can restrict them, then I think on the Android part, there's the aspect about the I think Android version 11 has the option about limiting access to your personal data, you can use an application and only lead life example, Google Map lead only access to information while using it or maybe not, but in normal sense, we get that we've allowed certain application which even don't need our information to access the information. So we are not aware, If somebody maybe can be able to pry eyes from that application, then they can be able to access that, then government policies to safeguard encryption. So it all starts, you don't start by us, then also the government. So, if the government can design policies that can safeguard encryption, because like, for example the issue about the United States, it's about the government was trying to actually force various corporate coke corporations to give a backdoor, so that they can be able to access information. So such things are actually traced to encryption, then we can talk about white hacker because we are aware that there are hackers, then we have white hackers and the black happens. So I think white hackers can be able to actually help, help you the constant change is always confronted in, in, in, in technology. So I think white hackers will be able to safeguard the encryption, news, they've got various different that we have actually currently happening. So I think there will be actually help us minimize the aspect about Blackhat hackers and that's why, in general, you'll support hackers, but we always want to have ethical hacking skills. Ethical Hacking persons who are driven with aspect about the human aspect about Internet that Internet is something for all. It should be able to use to drive the economy should be able to build people's lives, but if I told the Unknown Speaker 24:46 hackers, the black hackers, be able to get information, then I think it will be a hindrance to the fight about safe and strongest immigration. So, we cannot just tell how, how to keep safe in the digital space. That's something that someone can say how okay, it's about an equation. So, okay. What about encryption. So I think it starts by one only using end to end encrypted messaging platforms such as WhatsApp and signal alley busy I think there was that when WhatsApp actually was trying, they were when they sell things, and then they'll ask about certain information being used by Facebook to market and also to actually enable ease of interaction between the platforms, but all in all, if I don't Facebook can access the information, and Facebook, and policies are doing that from WhatsApp and I think such instances will enable the information that was supposed to be intended to other parties, be able to read that so that buttons, so that side so, end to end encryption is something that will help us actually avoid ELP as perfect as individual skills. When using strong and unique passwords. This is the simplest thing that people don't take seriously, someone can just come and say let's 12345 minutes. This is the password, but even agile can get that. So I think having unique and strong passwords, and even code this will always help us. Tempers enabled, be safe in the digital space. For example, I can put a question a new for example like assume somebody accesses your bank, you can be able to access your USB key like your bank account. So maybe you have some few dollars or something you can release the bank, then somebody can come and get them to get the money from you at that particular time you actually know the importance of having two times two to five different methods that can be able to help you. That's sightings help us bridge the gap that somebody else could be able to use. Then the third part can be about upgrading says security features, and universal updates to be up to date. For example, our laptops, the most of them use. We have the. We have various anti viruses which help us to secure our, our devices. Joel Okomoli 27:01 Yes. If you can do in another five minutes, kindly no problem. Okay, thank you. Unknown Speaker 27:08 I'm just done. Thank you so upgraded security features, then I think I'm almost done. So. So just to conclude, so the discussion about Yes, shows how much information is important and to ask for our privacy in the digital world. It's also important as pointed above that discussion on solutions are found for threats specially encryption. Someone was saying that it is not working, because for example we can conduct encryption. It gives a false things about because it's just like in my genetic material sense it's something that really need, then you can't audit any encryption. That's why when the government is trying to fight it, because you can't audit it, then you can't encrypt our system for example you can you can encrypt like how plants, or just our system, elaborate keep passes. So I think with the code, coordination and cooperation between various parties, you can be able to make encryption that are related to the threats are permeable and have the potential of eroding privacy, all stakeholder therefore needs to cooperate and find a way to enable a strong and secure digital presence, unless you've cut across from various sectors from the government to education, to all the sectors which may be involved. I think we can start by at least letting the youth know the importance of this they can be champions for such initiatives. So, my name is Vincent, and I'm just an introduction about why it's important to get involved with encryption, and what's the importance of encryption. So thank you so much. It mean pleasure sharing this with you. Joel Okomoli 28:44 Wow, that's amazing. Thank you, Vincent for sticking to the time. Joel Okomoli 28:49 I know you have raised many issues about encryption and related matters, but the most I think the most important question is Who benefits from encryption that summarizes your presentation and, you know, you've talked to government, you've talked to other stakeholders and the users in particular. So, I do not know, what, what are participants in the in the in the session think I want to allow just two questions, if we can have them in quick succession so that we are done in five minutes. And meanwhile, we should have, you know, Megan, preparing to come on to come on the, on the floor. So two quick questions for for Vincent, from the participants. Is it important encryption, do we need it. Unknown Speaker 29:50 Okay. Any question before I can just add on that. So it is important to they use actual encryption. Joel Okomoli 29:59 Before you answer before you answer. Let me just, yeah, yeah, prompting the audience to give us to find some one or two questions yes I can see one hand, this is. Oh, I can't say whose hand is up, or that is this one. Irvine Lumumba 30:25 Yep, perfect. No one I just want to, you know, congratulate Vincent for that elaborate presentation. And of course, the fact that encryption is very key. I don't really want to think this is a question it's more of maybe a food for thought yet. The difference between, you know, essentially encryption is is encompassing of privacy and secrecy, so that the, you know, how do we think about encryption in in matters, our own private information and also encryption in terms of secret information, especially when crime is involved, you know, because I think that's also another issue that is coming up. Maybe, maybe you can comment on it but I think for me it was more of something that we could also now start thinking about, especially as crime rates, especially in the digital world continue to escalate. Thank you so much. Joel Okomoli 31:19 Excellent, excellent. And thank you, Ervin, that's our head of membership and outreach. So in the interest of time I'll allow Vincent to respond, maybe in another two minutes so that we will come on the floor the next presenter. Thank you. Thank you, thank Unknown Speaker 31:34 you so much yeah Lumumba, okay, but again this is something this is actually a bus, I want to actually, and just the you started saying that encrypted about privacy and, and, and secrecy. So, it is up to us to be safe, like, Okay, someone wants to bet. It even even to the teams to the to this way, it's good for them to be safe. So let's start from there. First of all, let's have I know it is about ethics and stuff but first of all it's about being safe and being safe and being safe and secure. So, if the information we can put on the video space is safe and secure. Then I think that's the essence of encryption. Then now, the moment that we give a back door, for example during sightings, then actually which means what about if the wrong hand user the information for example, if I told you the government about going door to after limb say to have access to your phone, they can be able to stay you know where you are, what you're doing and stuff. Then, whatever you do, it gets out to the wrong hands. Yes, so then people actually listen to that, let us be secure in the digital space. Then after that, now, we cannot see ways of not deviating but at least we can now minimize the crime, we can actually have people's rights protecting the digital space, because I think that is various for example I think you recently said that it will be it will be spying, it will be not spying, it will be checking for them given tagline for example Linnaeus anybody, I use as such, for example, I say, let me say a cow. So if I searched for God and somebody that word, I said it's a bad word, which was below me maybe if I say your account. It's like an average then they'll be able to know who and who does who use this certain abusive word. So, what I can say is, in summary, encryption is about being secure and privacy in the digital space, no matter who you are, that's the first. That's the basic since, human rights, who said that means you need to be private and securely, you will free to express yourself, suffer that now we can now devise methods to actually actually now be able to now to control the abuse control there, the crime rate which is going on in the digital space, but essentially it's always good and acolyte fight for encryption full full encryption across all devices. Thank you. Joel Okomoli 33:50 Thank you very much, Vincent for that response and I think you summarized Well, There was a question on the chat from John burner, who is asking how can an ordinary user this country knowledge of ICT appreciate and use encryption. I think this has been part of your response and thank you John for your question. I am sure you understand that, you know Seth, as you want to be safe in the house. You also want to be safe online. You want to be sure that your message is only reaching the intended recipient. The thing that is very very important. So thank you very much. Lumumba is saying that you know you need to ensure you have strong passwords, try to have unique passwords across different platforms and that finally, as long as you have encryption. Thank you very much. There's the discussion continue on the chat, but because of time allow me to introduce, Megan, I know somebody was asking for ladies, I think Megan may be able to turn your video on but kindly come on the floor, please. Thank you very much. Megan Kathure 35:05 Thank you. Hi everyone my name is Megan Katherine, allow me to share my screaming, screaming at you, and make my presentation. Unknown Speaker 35:21 All right. So, as I say, My name is Megan, and picking I'm from Athens and left my presentation revolves around the legal landscape of encryption in African countries. I worked on specifically for African countries, Kenya, Ghana, Mali and Liberia, but for today's presentation, I will be giving a summary of two countries that will be Kenya and money. So, the this presentation is an update to the global partner, digital encryption map, which is there in just a minute. Unknown Speaker 36:05 Yes, so the work was an update for the global partners digital rather encryption map, which is a social purpose company that works to enable a digital environment that is underpinned by human rights. So, the indices that I used or the group uses for measuring encryption laws in all over the world. I find the general right to encryption, is there a specific law, either by the Constitution or statute that provides or that gives individuals entities and the general right to encryption. Secondly, the mandatory or minimum, if the mandatory minimum is a mandatory minimum or maximum encryption strength. Are there any laws that are either minimum or maximum standards for encryption products and services directly relates to the licensing and registration requirements are there laws that require users or providers of encryption products or services to be licensed or registered in the intermontane within the country and then for the export and import controls. Are there any laws that set out limitations and conditions and the lawful importation or exportation of encryption products and services, and second last, we have the obligation of providers to assist authorities as well as the obligation or individuals to assist authorities to decrypt any content that is encrypted, and this is usually encrypted communication. So starting off with the Kenyan legal landscape. The Kenyan legal landscape does not provide for any general rights to encryption. However, in the Data Protection Act of 2019 it mandates data controllers and data processors to consider Michelle such as the use of pseudo pseudo pseudonymisation and encryption of personal data, to give effect to data protection by design you will note that the writing of this specific provision is not in monetary terms so things like controllers and processors may not necessarily opt to encrypt the, the services that we use to data subject. And secondarily, again there's no mandatory minimum, there's no mandatory minimum or maximum encryption strength within any kind of law that allows or sets standards for encrypted encryption products, encryption products and services. There is also no licensing or decision requirement to providers who are offering encryption products or services. However, there was a law that was passed last year that required for an electronic certification service providers to apply for recognition within the country within 30 days of. They're supposed to fill out form and that form is supposed to be submitted within the communications authority in 30 days so please do comment for foreign electronic certification service providers, because then nature of services are in the encrypted form. They offer a form of registration or licensing requirements. There is also an explicit provision for export or import controls for encryption products or services. However, in the Kenya Information and Communications Regulations specifically regulations with regards to the importation type approval and distribution of communications equipment, one cannot import supply or distribute electronic communications equipment for commercial use, without a license from the communications authority. It is also a comment under these regulations that all communications equipment must be submitted to the communications authority, percent of people are attacked by acceptance. So once again, the laws are very clear in terms of offering an explicit regulations for encrypted products and services, but they went. You couldn't read into it that, by extension, encryption products and services, being in the nature of communications equipment, then there is an import or export control. Unknown Speaker 40:27 Lastly, there with no obligation. Generally no general obligation providers to assist authorities to decrypt encrypted communications, however, by dint of a law that was passed last year again 33 amended Official Secrets Act by the statute, miscellaneous Amendments Act of 2020. This law can be interpreted to give aids de facto obliging providers to assist state authorities to access content of encrypted communication this law or legislation specifically reads that it allows cabinet secretary. There is with respect to the ICT space to apply to the High Court to require any person who owns or control the need to telecommunications operators is for the sending or receipt of any data to or from any place outside Kenya to produce to the cabinet secretary, or any person indeed the order the original or transcripts of all such data into other documents relating to such data. And this is usually when there is an edge of protecting such a national interest. And as we all know our political landscape, our political landscape is fitting into various facets of the society so national interest is usually not defined, and it could be very wide net in costs the same laws are in Section six of the Official Secrets Act would apply to the requirement or no requirement for the obligations on individuals to assist authorities. Moving on to the other country that would be my view, there is a comprehensive such a law on encryption in writing, and they have a such legislation on the rules, which is stated as the rules applicable to them and modalities, services and systems of cryptology. The law allows for a general right to encryption however for use of encryption services in the country, or the encryption services are categorized into NFV services or upgrade up services. Again, there is no mandatory minimum or maximum encryptions change in Mali, through, through to its legislation, but there is a licensing registration requirement to the law. There is also an input to export control by article 11 of the of the of the Act, which provides that the supply are important by means of cryptology not providing exclusive authentication or integrity control functions is subject to our prior declarations to the authority. There are also obligations on providers, but the obligations of providers in terms of accessing to decrypt encrypted communications. The employed, professional duties of professional secrecy or watch would otherwise known as confidentiality. The duty of be responsible for future dice costs to any person or to the person, and trusting them with the management of secrets or agreement in the event of any attack on the integrity confidentiality are available availability of the transformed data. There is no vacation individuals to assist authorities to decrypt encrypted communications, and there is also nor use personal use exemption on travel with encrypted, laptops, I forgot to mention this, Kenya. There is also no personal use exemption on travel with encrypted laptops. So, in summary, one of the, one of my findings was with a very low uptake of discussion of encryption in Africa. However, when you look at the global partners digital encryption map about 15 African countries have paid forms of controls for encryption in Africa divided from absolute restrictions to limited restrictions. And so the question is, wave, wave. Wave, wave is that under optic is it because of my lack of capacity, is it I just interest with this subject matter, or is it a question of disinformation yesterday I saw actually on Twitter that whereby I certainly do and minister was the that encryption. The use of encryption, or rather the use of VPN, I tend to his agenda. As to the country's interest because they tend to transmit, but he was giving an example that ban your personal information specifically your bank data can be linked with a user Unknown Speaker 45:27 VPN So, is it whichever country that you will be situated in our county is it a local interest, is it just interest issue, or is it disinfo disinformation. So, generally, in conclusion, I would say there is a need for having these discussions in the middle of having encryption and substantial encryption laws in Africa, and not just lost that client as the right, on one hand to the encryption services, and to take away that right on the other hand, by giving a wide array of exemptions on grounds of national security, for instance, to watch or doubt any encryption rights that people have, as he wrote notes the increase in Rise of surveillance state cyber attacks, Unknown Speaker 46:16 and this Unknown Speaker 46:19 also argument, the argument that we need to have better encryption laws in Africa, and the world at large. That will be the end of my presentation. Thank you for your time. Joel Okomoli 46:35 Thank you. Thank you very much, Megan, thank you for this excellent conversation I see the chat house is on fire. There are a few patients but I will say that you handle this subject very well. I know we started with the discussion about encryption and how useful it is, but now we asked him what is the measure how far can we go in terms of encryption and so on. This Miska guru has presented very well. So, I will, because of time again I will pick up one question here that you do not have to respond to, or maybe it's food for thoughts how do you, how would you explain encryption to my mom Boga. This What about a rider, um there is somebody who is asking, no more messages encrypted, you know, like text messages, eg does Safaricom know all about my conversation. I'm assuming you're asking about provider. So I will avoid mentioning the company names but you know the provider will the provider know about the content of your messages. So, before Megan comes on board, one more issue, maybe, anyone, then she can respond to all those issues and also comment on the issue of. Yes, I think some of the issues are being answered on the, on the chat. Okay, let's allow Megan, some two more minutes. Thank you for sticking to the time. We can give you three minutes actually to respond to those issues comment on the issue of VPNs are they useful, do they create more risk, or they need to get a virtual private networks, and then to a common user like somebody who runs on the roads. Do they care how the road is constructed. Will they care about encryption, if they're using Internet and Internet related applications. Welcome. Mega. Unknown Speaker 48:41 Okay, um, unfortunately I didn't get the very last question. However, on the issue of VPN virtual private networks. They could present a challenge with encryption services, especially if it's Alex's free VPN, Enter. We see that someone has mentioned in the chat. It's not it. It's a fear or type of situation, I will say they are both good and they could pose risk as well, because different service providers have different they ascribe to different ideals and different standards of encryption. It will be dependent on the type of provider you're using for your VPN services. Joel Okomoli 49:29 Okay, the last question was about a user and non technical user actually talking about the everyday people who use probably the most ordinary phone or a smartphone, but they are non techies. Is it possible to discuss the issue of encryption with them. How would you present the issue of encryption. Unknown Speaker 50:00 All right, so this technical matters and subjects would definitely need to be upscaled by societies such as Internet Society are other civil society organisms such as kick Internet, I, I'm sure I never thought about kick Internet, though. Through various outreach opportunities and organ. So, through various outreach opportunities we it is possible to have these discussions with non techies, it will take time. Joel Okomoli 50:36 i It's possible, but is the spirit, and I think you answered it well. We must create a forum, we must be able to communicate, and the as much as we have a few people here who are quite advanced in this area, and also in Internet related technologies. We need to bring the other people on board, and I think Megan you have said that well, the whole purpose of this fundamentals program is to bridge this gap. I hope the conversation continues from here, so that we can go further into these matters. What do we what has been covered. We need to interpret it and share it with those Yeah, break it down to everyone to understand so that when we go on to advocate for these encryption, and protect encryption, then it is understood very well. Allow me now to welcome our last presenter. And most important, most important, because Paul will be talking to us about her web service, and it will touch on a bit of the aspects that Vincent stucked on and also amplify probably some aspects of security that Megan Brooks before Paul, if you're ready, we can share your screen as well. Joel Okomoli 52:21 We have Paul in the house lunghi. Everything can you help. Oh boy, you're here. I think I can call you are not muted, you unmuted. Unknown Speaker 52:41 Looks like interrupt. I think he's unmuted now. Bye. He has a microphone issue. He's correcting his audio now so let's give him a few minutes. Okay, I think it's coming on. Yeah. Yes, unmute yourself. Can't hear you, Paul. Hi. Hello. That's better. Yes. Are you ready, just give me a moment. Nothing technical challenges. Yeah, give me a like, okay, we can start Okay. In five minutes. Yes. Okay. Okay, can you mute yourself then we can run through. Erwin, can you help me with whatever I'm ready, I'm ready, I'm ready. Okay. Okay then. That's nice. The flow is us, have a presentation, you can share your screen. Moving from time to time. You can run the show, Paul. Yes, there is nothing that you can do f5 By using a laptop. Okay. Paul K. Kilongi 55:25 Yes, yeah, okay, and you're doing securing web servers. Okay, I'm doing securing web service. The Internet Society develop the C project as a tool for organizations to comply with Internet standards, so I'll be using the OSC to do the exercise. The idea is for the web server to be configured to reach 100% at Internet NL on HTTP two pro performed the task on an Apache web server. To begin with, before we began the exercise. The test was at 36%. So my goal was to reach 100% to cover all the subjects. I was using the domain artist special school.ac dot k does School is a school for disabled children, where I come from this built on WordPress on over Patreon web server. The testing parameters for DNS, for the, for the Internet 10 l DNS sec. IP version see HTTPS security options, then the mark and RP QPI for routing. Basically, we want to test the domain so that is the standard, the modern Internet standards. Okay these are, these are SSL tool a free tool on cPanel. It's called Let's Encrypt. This will be available to anyone. Okay. To begin the DNS SEC configuration, there are two parameters. The first is the Registrar of your domain needs to be able to access delegation signal or DNS records, and the number two, the DNS hosting provider region since name servers, your domains will support DNS sec, not your hosting provider should be able to support the NSSF audit to be successful. My hosting provider advised me to use CloudFlare, because they were not able to go, that's what I was trying to do at Cloudflare. A configure the name servers from CloudFlare, on my hosting, domain. This was done through the DNS up at Cloudflare. Next, after enabling the DNSSEC on Cloudflare. I took that DNS records from CloudFlare, and appropriate for my host my hosting company, then the puppet on their sides. The two should be able to synchronize. What you have your configurations IDs records will also be able to read and the registry for that is the idea of DNSSEC. The next task was to configure SSL and TLS, this is encryption. This is done on a certificate on CloudFlare, and the parameters are here on the screen, like in TTTS I put on enable it just Yes. And they enabled TLS TLS, 1.3, and HTML move at this point, after enabling DNSSEC, until LSL the compliance reached 94%. After that I went back to the open standards, everywhere, documentation, and they copied this code, this headers, which I put on my HT access file. This is the main configuration file on an Apache server. After doing this, the compliance which 97% I must say, I stuck up 95 97% For a long time. It will deny know that the contents of your website can can make you what achieved the standard the required standard. So I had to remove some images which were linking to external sources, which had HTTP references. And then after that, I came back again to the CloudFlare, the TLS SSL tab. I went to the minimum TLS version. I increased it from version 1.2 1.3 These combined with removing images scripts and everything that was pointing towards HTTP enabled me achieved 100% Paul K. Kilongi 1:00:03 This is. This is the best that could have been done. And also on the HTTP. Two Pro. When I ran the Domaining should have passed, support for HTTP. HTTP two. So remember, the test was the web server should be configured to achieve 100% on the internet.nl website. And also it should pass on the HTTP to workpro, which I did follow them. My observation during this exercise. Was that a majority of organizations in Kenya, including the governments, our own ICANN ISOC chapter, and many more. We do organizations, they don't comply to the internet.nl standards, which means it is not widely known. And maybe this advocacyis required. That's it. Thank, thank you very much. Any questions Joel Okomoli 1:01:13 Thank you fun. Yeah, that was quite practical. I think the audience I agree, right. Joel Okomoli 1:01:21 I want to just stop sharing your screen now, maybe we have. We have like a thank you very much, we, we have luxury of a few minutes, been asked to turn on my video for a moment so just turn it on for a moment and say hi. I hope you can all see me. So, um, there is a one or two questions. There's a discussion going on actually concerning the previous presentation and even the current one. But Paul has brought to the fore a few issues, you know, and what probably we can do. Oh, yeah, the ISOC dot O R ke website, is that 32% We all know what is happening about due to that domain, and I wish that maybe our former SG. Mr general would be able to join us and they experienced this. But Paul maybe you need to give us a tell us how far you went, because this work has to be published on that website. Were you able to access the domain. That will be there. This domain is demonstrating. Now the nice Data Domain ADLINK Oh no, Paul K. Kilongi 1:02:33 I've not been able to. Okay, I interrupted when he told me he will give me the credentials. I'm still waiting. Okay, Joel Okomoli 1:02:44 I believe this is work in progress. And I think it's on track. Internet dot L, the tools that Paul was referring to our members should be able to try this out. I think it's a good experience. Did you try any other websites, Unknown Speaker 1:02:59 I tried the communication authority, University of Nairobi, none of the websites in Kenya was 100%. Joel Okomoli 1:03:10 Excellent. So this is the information that needs to come out, you know, the fact that you can have a page online and be able to disseminate certain information does not make you very safe. We need then hello applications. I don't know, one or two questions, I think now Morgan, our former former chair and acting chair is also in the house, and then me, I know a few questions Joel Okomoli 1:03:38 for Mr Kilani he has done a good job. Education football. All right, in the absence of any queries. You can ask Unknown Speaker 1:04:03 a question. Yes. Welcome, sir. I think Paul's done well. Just wanted to know like Hawi Rapudo 1:04:14 how frequent, can you be doing this measurement, and how can you come. Is there a simplified way of correcting those challenges that have been identified on those websites that don't comply or DSCS the ones that don't comply, Unknown Speaker 1:04:39 up to the system administrator of those organizations I think they don't, these Internet ml standards. I think it's not well known. Here, organizations in Kenya, and even the, the NSSF, but my experience is that even my web host did not understand this concept of DNS sec. So it took a while for him to help me on his end. Permission is not about to discuss. Okay, so much. Joel Okomoli 1:05:31 Morris Morris Kitana, you have a question. No no no not. Not at the moment, everything is well explained. Joel Okomoli 1:05:46 Alright, right, thank you, thank you very much. We have a few issues, especially revolving around personal data, and what can be done. We have all heard of the data core mission, which recently came into being by an act of parliament. I know that this will be one of the organizations that will be very instrumental in ensuring that data for Kenyans is secure. And if you find these a breach, especially by the public or by government, then you need to sue someone, and that will be the data commission. I don't know whether Paul will be able to comment on this, or, Megan. Megan handle the issue of the Global Map. Megan Kageura. Then also will welcome check, maybe in three minutes to just give us some insights, what is happening in other countries. Mr Jagger, can you help us in three minutes, Megan, I can do good the question. I didn't get what I supposed to comment on exactly the role of the data commission, you know, recently we got our new data Commissioner, and the commission is also very very new, it came into being through an Act of Parliament, and this is a question of the bill that was widely in circulation. If we were to comment on it. Unknown Speaker 1:07:20 All right, so the office is in operation has a lot of work to do their issues to do with funding, how much money has been allocated from the within a budget that was released a few weeks ago, but we have a long way to go in terms of our data protection, landscape in the country that is much I will be able to comment. Unknown Speaker 1:07:50 Thank you. Thank you, Megan, Paul, for me, I think probably issues to do with data security, in line with what I've just presented. I think should be incorporated. Because I have achieved all that at no extra costs. So it's not about money. I think it's more to do with the awareness. I think I'm thinking, some of these things should be added. Joel Okomoli 1:08:37 Thank you, Paul. I would also welcome Vincent, if you're sitting the house Vincent, would like to say something about the letter commission. Unknown Speaker 1:08:50 Hello. Okay, yes. Actually I was, I've been, I've been disadvantaged I've been going through. So, whenever commission, okay what if I found out recently that. Okay, it's just a community I've been critic okay the government isn't okay. Oh come clear. Yes we can hear you. Yes, the bill in Parliament which we are totally frustrated that was done that people are complaining that the information inserted into the error when we said about the Duma number and stuff that the government was getting information but they didn't know who was actually handling the information. So the communication, then there was cases that at least can be you know an office where the information, attending the people's the general public can be handled, and at least they can be somebody to let me say, and gatekeeper to be able to manage that. So, the recent bill just the mechanism talked about is that okay we there's so much. The, the issue about the government's that there's so much that they don't tell them they're not open to the general public. And that's why he knows when saying, It needs people from various sectors, for example from the lawmakers that can the academia, the private society, each one. Come on, boss. At least we can be able to get the information. So I think that's what I can disclose for now. And I think much we can be able to share in the personal day, in case of them there's so many discussion will be having. But in English. Joel Okomoli 1:10:13 Thank you. Thank you, Vincent, that was, that was a quite a good response, I want to welcome Athena, but she comes on with a dual role. So at first I didn't know you're my co host. So you introduce yourself and then go on and say something about the data commission I know you have something else to say again, welcome Athena. Athena Morgan 1:10:32 Hey Joel. Clearly, yes. Sorry for joining late, I was a bit held up as your former acting chair. And now I play several roles, but first of all, to comment on the issue of the data commission that recently they, there was a data come under the Office of the data Commissioner, there is the data commission task force that was formed. And right now the key mandate of the commission is to get insight from the general public. So for example, the issue of political parties. Yes information has been collected that is private. But other than the people who are complaining on social media, no one has made a formal complaint. So if for example, someone finds themselves registered in a party that they did not want to or information about themselves has been captured, that they had not shared, they're meant to go to the Data commission Task Force, and report this, as there is the documents that they are meant to fill, and with the particulars of the data breach. And then it is the responsibility of this task force to do an investigation, follow up, and then, if not, there is a case to answer the party that did the breach of data, or use this data without authorization will be brought to book by the data commission task force. So, I think, other than just the fact that the act was passed and the office of the data commission was formed and the commissioner was appointed there's still more steps that have been taken, including the formation of the task force, which is very active, actually. So now the key role is to the common one and we had a meeting sometime earlier this week with someone from the task force and they were saying that yes the task forces exists but people don't know about it so they don't even report so the task force has nothing to do because it's not the task force to go and look at who has been aggrieved, but it's for the aggrieved party to go to the task force and report. I'm not sure how effective it is yet. For those who may have tried to report, but maybe people can go and see, or can report and then find out oh effectivity. Joel Okomoli 1:12:48 I'm actually told that there are people who have reported, and they will have a complaint. I don't know that they're not able to access these complaints or is a broken link somewhere, Athena Morgan 1:13:02 not for the issue of the political parties. What I know is, most of the people have been ranting on social media. The formal complaints if they have been made yet, they have not been made aware to the public, that there is someone who has launched a complaint. So the issue that when we were having this discussion that member from the task force was saying, the challenge they're facing is that people talking on social media platforms, but are not taking active steps to go and complain, not about the political parties, but any other form of data breach. So that's I said it's up to the to us to educate the citizenry, on how to make this report for the commission to work more effectively. Thank you very much. Yes, gone, sorry. No, no I was just saying the comment by Kevin that 200 people have complained about the political parties, yeah. They're not complaining was not targeted to the purchase was a General. General Comment. People complain on social media than making actual filing actual complaints that is what I meant. I hope it's clear. Kevin G. Chege 1:14:21 Yeah, thanks, thanks, Dennis, I was just reading that Twitter link, there was an update sent by the Office of a data protection Commissioner they said they received 200 official complaints. This was just I think an hour or two ago so it looks like people have started complaining so let's see how that is resolved, Unknown Speaker 1:14:45 and it's a tensor. Yeah, thank you. Thank you, Jen, I proceed, I give the rest of Joel Okomoli 1:14:54 it. Let me bring back Kevin to also touch on the other issue, you know, the only issue with the Kenyan data is not the political parties. We have had other issues around. You know the recent issues around the mobile phone users, and the hacking and also those messages that keep popping up for one thing or the other. I don't know whether Kevin will be able to comment on this, and then I'll bring back out there not to do the other two minutes. Welcome Kevin. Kevin G. Chege 1:15:26 Okay, thanks. Thanks Joe. I think for me the, you know that there are lots of things happening I am mostly on the sort of technical side of this encryption discussion and when given the opportunity to talk to you know people who are new to this obviously there are many tools out there to protect yourself and protect your information when you're online, you just need to be aware of what they are. I think the government is you know making good strides with offices like Office of the data Commissioner but you know it's been mentioned here by previous speakers. These are still a long way to go. But in the meantime, I think it's for us to educate ourselves in our community about the dangers of, you know, being online and how you can stay safe, you know, using things like encryption using strong passwords using two factor authentication being, you know, we are very quick to click through policies but we don't really understand what we are consenting to, you know, something will flash up and say Do you agree and just click and to a common user you may not know what you are consenting to so there's a lot of work to be done in terms of educating our, our user so as ISOC, you know there's a lot of information on our website, we have several trainings on encryption and Internet governance for those in the technical world, there are a lot of trainings on how to set up your own services, how to manage and deploy them and how to use all these new encryption tools. So I think and discussions, just like this I think I've really enjoyed this discussion. Thanks to the chapter for organizing this and all the presenters was very informative. And I think if we keep on like this, we will go a long way in educating our community. Thanks, Joel for the opportunity. Joel Okomoli 1:17:19 Thank you very much, Mr. Kevin, Tiger. That is a our important sticky in this space, I think, you know, towards the end of this year, we must have this conversation Harry is planning a stakeholders meeting it was the end of the year, we are still looking around to see who can be the, you know the main people to help us with shaping the conversation, but our eyes set on the issue of encryption. More specifically, protecting, protecting the Kenyan user, and also bringing to light, issues around the WHO Duma number, or what we are having in Kenya as a consolidation of identities, but also alongside that we have, we have the, the data commission that came into existence this year, and we hope to engage one or two persons there so that they join this conversation, just to help us disseminate one on their roles and secondly, on the benefits they bring to the ICT space. So thank you again, Kevin, for those remarks, I want to welcome ivenna also mentioned something else he's doing with the communications authority and formally introduce myself, Dana and I are the moderators. We are the administrators for your fundamentals program 2021 It was a good experience. I don't know. For myself, I think it has been fulfilling. I know that we had a few below average responses, out of 47 applicants, we had about, only five people six people coming through. Okay, to be fair, maybe eight, but the others could not pick least to the end, but we understand because we are all engaged in a lot of other activities. But for me, having this webinar, and the next one we're having on Tuesday. Same time, same place, is a hallmark, because we start a very important conversation, which will carry us through to the end of the. And I think when he's coming on later you will hear that he's talking about the same things, let me allow a thinner if you drop out. Atlanta to just say something, and also because he's a co host with me if you can log back in, I think you dropped out. She just dropped out. Okay, I think she will be coming back. I will allow this minute to, I don't know I think we have two people who are logged out outside Kenya, I think, I don't know, is anyone logged in from outside Kenya. We have five minutes result for that. Anyone from diaspora are Kenyan but living abroad. Okay, I've no your back. But Lawrence, you need to say something, and a team. I hope I pronounced that, okay, Tim. Let's give him a minute to team. If you can hear me. Tim Dudiefa 1:20:39 Hi, thank you very much. Once again, it's a pleasure to be, to be in your midst, again, I always like this is about the fourth meeting of ISOC I'm attending, and I joined ISOC last month, so I'm new here, and everything is not very exciting. So since I have the opportunity to speak, I'll just go ahead and take two minutes to talk about what. So my name is Sim DDF I'm Manchurian, and I'm currently Tory in Africa, trying to partner with every Wisp operator on the continent. I run a startup called whisk doc Africa, and my primary goal is to increase Internet penetration on the continent. We know Africa has over 1.3 billion inhabitants and only 30% of our population has access to Internet, and over half of that amount that has access to Internet have access only their mobile phone. So it's not entirely accurate to say that this person has access to Internet so, which is very, very cool. So, we spoke Africa's goal is to increase Internet penetration on the continent by providing a means for everyone to get access to the Internet. And one of the ways I'm practically solving this problem is one I created the continents first Wisp directory, which directory does is it allows broadband Internet seekers to simply go to the platform, enter their address, their location, then it'll show them all the point of. There's operators around them. And then they can click on either of them you can click on on this hour that are that are on call to pay services and then before they make up their mind on who to get service from now. I also, before I embarked on this particular task, I noticed a good number of people in Africa, don't know that they could have access to high speed Internet, a lot of was just a lot of just resigned to the fact that they are their telco gives them X amount of data or they buy X amount of data from a telco and they just stick to that. And because it's data that they have to pay heavily for the end of Russian in its meanwhile if you take all the money that is spent on mobile data and put it into painful broadband, you'll get unlimited high speed Internet for a whole month. So trying to solve that problem. And one of the things that to the my width directory does is it allows Wisp operators make themselves visible to 1000s of potential customers. Yeah, so that's that's part of what I'm doing and whisper Africa is also building a MOOC. With back end, it's it's an online school that is geared towards helping young Africans, develop tailored skills, structured skills that will help them work in the broadband industry and also help young enterpreneurs develop skills they need to build wisps in their communities. So yes, we're doing a lot of work, and we are seeking as as many collaborators as possible and ISOC is about the best place to achieve this, so I'm here, I'm trying to gather every one of you to come join me help out in any way you can, if it's just talking about it, or contributing, or helping us fund, the projects that we, oh yeah, one other interesting thing that we're doing recently started the broadband for projects. But Brian for projects is we basically go into a community and then spend a lot of time, no I budgeted about three intimating. The inhabitants of the community why they need broadband Internet, and then at the end of the day, get them to commit to. So, our first project is in yenagoa So that's all broadband for your network. So, what we're funding the pilot of the project in the integral unit was the capital of Biafra states in Nigeria, so we're running we were running the project as a pilot and then we use the success of that project and replicated across Africa, again I said the goal of Western Africa, is to increase Internet penetration on the continent, do it very accurately and collect a whole lot of data. Thank you. Joel Okomoli 1:25:21 Thank you very much. Thank you, Tim. Rich, I'll give you one minutes. If you are okay let me give you two minutes to be fair, kindly arrange Ulrich Cabrel TOKAM TINGANG 1:25:34 evening everybody. I am going to come, I'm in California actually doing my PhD in Civil Engineering at the University of Nairobi. Under the fully funded scholarship of the African Union, so I'm not the professional of computer scientists are just a civil engineering passionate about international development. So actually I'm a consultant the un, un abita Aerobie also during the project about what does an equation agenda balances in the far south of Darfur Madagascar. I'm here to learn. I'm here to give a small contribution to spread around on the importance of Internet. And then I'd like to be part of your thank you very much. Joel Okomoli 1:26:26 Thank you very much. I hope you enjoy your stay in Nairobi, and you also join us next week. But before then make sure you look for Nima Joma and so that you tell us how it was going. Thank you very much. Joel Okomoli 1:26:47 Thank you. Thank you very much. Let me out, we have about two minutes to the end of our program today. I know we have quite a few other people who might want to say a word or two but I will give this a special moment to attend and Morgan, to just share with us a few insights, before I welcome. Harvey, to do a lot of things, welcome Madonna. Unknown Speaker 1:27:16 Thank you Joe. Sorry my internet's job for a minute. So, what I've been doing recently with communications authority, we've been running a program for Child Online Safety. That is dubbed co P. I'm sure you've heard of it. And we have been doing a four weeks training for various stakeholders that government officials, teachers, parents, lawmakers and NGOs that directly deal with children on various aspects of technology. We've looked at issues of child abuse online we've actually done a bit on encryption and cybersecurity. We've also done the legal aspect, we've done, international cooperation with organizations like International Center for Missing and Exploited Children, and the Internet Watch Foundation, they've been very key in directing how multinational organizations are working with local law enforcement to reduce the crime rates against children, and children trafficking. On the web, out because of issues like online grooming. So it's been a very educative session, and I was thinking that now that we have completed this transition process and we have just a few more steps left ISOC can actually do a bit more with our system so even ISOC global, including partnership with CA because they're open for partnerships, and also bring in facilitators to tackle on various issues of child online safety, whereby you can just float your idea through me, and then I'll talk to the guys in charge and we can see which session. One of the people who is representing ISOC can facilitate and also the next training which members now can attend is from second August, now that this financially is coming to a close, the next training is starting on second August, and on the same, you could still reach out to me and I'll send the links on how to join, so that you can be able to participate. The sessions are both online and now that the COVID restrictions have been lifted, there is hope that there'll be also physical classes for a week, but online classes go for four weeks. And that's twice, two days a week, Tuesdays and Thursdays from 11am to 1pm. So basically that's what I've been doing, and I can see that there is a lot of ways we can work together with ISOC global and local the local chapter once you finish running up this process to make the project also beneficial to our members. So thanks, John, for the opportunity and lunches, they'll be here on time today was quite held out sorry for that. Joel Okomoli 1:30:06 You are. You're excused. And actually, Tuesday will also start very much on time. I hope that you will have more sharing for us. And probably some links second August is not very far away. I think all members can prepare. Yes, I will do that. Excellent, thank you very much. So, before I will come. How to do the vote of things for us. I'll just mention that there are a few things happening in the country at the moment we have colleagues of genders from outside the country and you can I think you'll get the gist. The trend is, is there, if you go around, you'll be able to see whether it's on social media, or even on policy, I suppose, we have smart cities in Kenya and I think we I was hoping that one of our researchers will look at Nakuru, and what is happening around there, but that did not happen so that is still operate for us going forward. The land registry has been highlighted so much on the on the charts, and that is one area where people share a lot of personal data, including location. And the email and phone contacts, this is all at risk, can we think about it and see what we can do. And then there are a lot of areas where we consent, I think this was brought forward by Megan in her presentation, we know we simply consent and say yes, or when we are looking for a service and we have to consent, you just say yes, without regard to how much of your information you're giving away. So, this, there's a lot of work to be done. And if you had Kevin very well, I said this behind the walls, but we know that in the front, there's a lot of work that is also going on. Let's continue this conversation, I would like to pass a very very sincere appreciation to our presenters in person so Vincent Mindell worked very hard in the short notice. And Megan, Catherine. And also, Paul. Kyla who does our celebrants today. Next week we'll also have another three who will have a very interesting discussion. For us, as a chapter. I know our numbers are not very high. Basically because we also have to fit into the time, working, working time or working hours within the East African Community. Three o'clock might not be the best, but we also had to juggle their options at 10 o'clock in the morning was our suitable choice, but that would be too early for some regions, and then also nine o'clock, will be too late, but feel free to give that three o'clock, East African time, or 15 out of 1500 hours would be the most suitable across Alaska space. And so but we are welcoming all your feedback along these times. Oh quickly also mentioned that we have a members meeting, which is happening on a Wednesday, I think, heavy rapido might stick to that a little. Maybe welcome the members to participate as actively as we've done today. Thank you very much, as many hosts, and as Atlanta has alluded, next week we are here again at three o'clock. Don't fail to register. Now Howie, the floor is yours. Welcome, sir. Hawi Rapudo 1:33:42 Thank you so much for joining us, the focus ones, for, for gracing this occasion. And I believe that most of us are happy, and happy just now just to share on the charts and just say I'm happy, I'm happy to give those comments. And also, and also the work that you've done. Allow me to move into the water stocks. One is that we have the presenters and I think Wilson did quite well. And one of the things that I picked up from Vincent that he was able to touch on the issue of what is happening during the COVID-19, the banking sector, and, and the commercial sector is happening within the clouds and other people are not able to. Madeline picked up so well. I will say thank you so we were talking about lack of formal complaint, lack of lack of information on the legality, behind the processes, when I talk about data protection. Moving to Paul. Longley which also presented. I think also your mesocosm touching on issues of measurement. How do you measure Internet platforms to ensure that they are, they upset, or they're protected from encryption, I think what we're just saying as Internet Society we need to turn this presentation into purpose and I think we love to do together, joy and Attila thank you so much, we're the moderator for this session on the membership is finding, allow me also to thank the Vice President and the Vice President Lumumba, the membership committee chair, and also Dr Richard Amano also with us also moved now to the ISOC level before we move back to the numbers. And I want to thank Kevin jacket for taking time to be with us and I believe that will take time to join us during the, the witness the meeting, and the one on Tuesday, so that you can be able to take ISOC in from for the members who have been able to attend they are now we have Charles Benson we have. We have Tim yob Lawrence young, we have espon novel rich, we have John we have another allowance, which I think is to Molly's Uttama, and Regina, Joseph, and I believe we want to thank you for your time and take your time, and also want to tell, Victor. Victor for ISOC global was able to under the risks for this meeting and want to say thank you and we look forward to inviting you for the session today on Tuesday, and also Wednesday we were able to attend so that we can be able to attend one meeting, which are not very, we shall discuss about the action plan for 2018 to 2020, wanted to do and what I saw ISOC plenty chapter would like to do in the last coming months. Thank you so much. Back to you. Joel Okomoli 1:37:16 Thank you, Howie, thanks for that. We can close with a word of prayer. And thanks to everyone. Joel Okomoli 1:37:25 Zerah, if you are here. We do want to say hello and pray for us. So you can hear your voice. Massa D able to speak. Okay, Regina. Regional Director. Okay, anyone who can unmute easily, and he does the closure. Okay, that says you cannot use a microphone. Anyone. Okay. Hello. Okay, Regina came up, thank you good evening Regina. Let us pray. Thank you. Regina Ndiritu 1:38:23 Our Dear Heavenly Father, we come before you this afternoon, with thanksgiving in our hearts. Thank you Joe for all that you've been able to do. We thank you for the gift of life for the gift of all of us connected virtually here we pray that you may be with us. You help us to continue to protect each other, to protect others by sharing our knowledge of the even the Internet, and even securing data wherever we are. We pray that you may bless that you may continue to take us to take care of us. We bless you in your new name in Jesus name we pray and give things. Amen. Amen. Unknown Speaker 1:39:04 Thank you so much. Bye everyone, recording stopped. Thank you. During the winbind. Okay, you're gonna log off we're going to close.