“System uptime, data protection and identity theft are weighty issues. It takes real ingenuity to out-think the fraudsters who are trying to steal identities and hack into enterprise systems. “- Chris Shipley Introduction The Data Protection Act No. 24 of 2019 was...
Introduction For a long time, the people of Kenya participated in governance indirectly through their representatives in Parliament. This position changed with the 2010 Constitution which for the first time recognized and mandated public officers as well as law making...
Copyright is a property right in an original work of authorship fixed in any tangible medium of expression. It gives the holder the exclusive right to reproduce, adapt, distribute, perform, and display the work. In other words, copyright is “a monopoly of limited...
Ruth Benedict, in the book Patterns of Culture (1934) said: “The life history of the individual is first and foremost an accommodation to the patterns and standards traditionally handed in his community. From the moment of his birth the customs into which he is born...
1.0. Introduction For a long time, money lending was a preserve of commercial banks which dominate the Kenyan credit market. Many private individuals as well as Small to Medium-sized Enterprises (SMEs) and big corporations relied on credit facilities from commercial...
According to a Report by Serianu, a Pan-African based cybersecurity and Business Consulting firm, Kenya’s economy lost more than Ksh. 29.5 billion from cyber-attacks in 2018.[1]The Communication Authority of Kenya further reported that Cyber threats rose over 10% in...