<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber crime reporting Archives - Netsheria</title>
	<atom:link href="https://netsheria.com/tag/cyber-crime-reporting/feed/" rel="self" type="application/rss+xml" />
	<link>https://netsheria.com/tag/cyber-crime-reporting/</link>
	<description></description>
	<lastBuildDate>Wed, 03 Jul 2024 12:22:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://netsheria.com/wp-content/uploads/2023/11/cropped-Netsheria-Logo-Final-Version.mobile-1-32x32.png</url>
	<title>Cyber crime reporting Archives - Netsheria</title>
	<link>https://netsheria.com/tag/cyber-crime-reporting/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Overview of the Computer Misuse and Cybercrime (Critical Information Infrastructure and Cybercrime Management) Regulations, 2024</title>
		<link>https://netsheria.com/overview-of-the-computer-misuse-and-cybercrime-critical-information-infrastructure-and-cybercrime-management-regulations-2024/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 02 Jul 2024 08:48:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CII]]></category>
		<category><![CDATA[Computer crime and cyber crime]]></category>
		<category><![CDATA[Computer misuse and cybercrimes act]]></category>
		<category><![CDATA[Critical Information Infrastructure (CII)]]></category>
		<category><![CDATA[cyber crime authority]]></category>
		<category><![CDATA[Cyber crime reporting]]></category>
		<category><![CDATA[Cybercrime Management Regulations]]></category>
		<category><![CDATA[Cybersecurity Operations Centres]]></category>
		<category><![CDATA[Cybersecurity Regulations 2024]]></category>
		<category><![CDATA[Data Security Regulations]]></category>
		<category><![CDATA[How to comply with CII regulations in Kenya 2024]]></category>
		<category><![CDATA[Impact of cybercrime management regulations on businesses]]></category>
		<category><![CDATA[Kenya Cybercrime Law]]></category>
		<category><![CDATA[legal alerts in kenya]]></category>
		<category><![CDATA[Role of SOCs in CII protection]]></category>
		<category><![CDATA[safeguarding kenya's digital infrastructure]]></category>
		<category><![CDATA[the computer misuse and cybercrimes act]]></category>
		<category><![CDATA[What are the cybersecurity requirements for CII in Kenya?]]></category>
		<category><![CDATA[What is the cyber crime law in Kenya?]]></category>
		<guid isPermaLink="false">https://netsheria.com/?p=13670</guid>

					<description><![CDATA[<p>Vide Legal Notice No. 44 of 2024, the Ministry of Interior on 11th April 2024 confirmed that the National Assembly had approved the Computer Misuse and Cybercrime (Critical Information Infrastructure and Cybercrime Management) Regulations, 2024 (the Regulations).</p>
<p>The post <a href="https://netsheria.com/overview-of-the-computer-misuse-and-cybercrime-critical-information-infrastructure-and-cybercrime-management-regulations-2024/">Overview of the Computer Misuse and Cybercrime (Critical Information Infrastructure and Cybercrime Management) Regulations, 2024</a> appeared first on <a href="https://netsheria.com">Netsheria</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="bsf_rt_marker"></div><h3>Introduction<span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h3>
<p><span data-contrast="auto">Vide Legal Notice No. 44 of 2024, the Ministry of Interior on 11th April 2024 confirmed that the National Assembly had approved the Computer Misuse and Cybercrime (Critical Information Infrastructure and Cybercrime Management) Regulations, 2024 (the Regulations). This enactment is in pursuit of aligning with the Constitution, the Statutory Instruments Act of 2023, and the Computer Misuse and Cybercrimes Act of 2018 (the Act).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The Regulations, provide a robust framework to ensure the protection of critical information structures as well as monitor, </span><span data-contrast="auto">prevent, </span><span data-contrast="auto">detect, and respond to cybersecurity threats within Kenya’s cyberspace.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h4>Notable Aspects</h4>
<p><span data-contrast="auto">The Regulations emphasize the importance of building cybercrime capacity and capabilities by the public, government institutions, businesses, and private entities to improve readiness and elevate the priority of cybersecurity measures. The following are the key highlights of the Regulations to ensure enhanced cybersecurity operations management:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Establishment of Cybersecurity Operation Centres mandated to protect, monitor, detect, analyze, respond, and report on cybersecurity incidents and threats.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Enforce C</span><span data-contrast="auto">ritical Information Infrastructure protection measures that support essential sectors such as banking, telecommunications, energy, and transport.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Establishment of special cybercrime desks with trained personnel at every police station in Kenya.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Requirement for the conduct of annual cyber-risk assessment and business impact analyses by all critical information sectors including services, products, business operations, and processes.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Recovery and </span><span data-contrast="auto">business </span><span data-contrast="auto">continuity plans when a disaster occurs.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Methods for tackling scams, identity theft, hacking, and online fraud</span><span data-contrast="auto"> in cyberspace and IoT.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-contrast="auto">To ensure an understanding of the above highlights, this article will delve into the key propositions captured in the Regulations that will help in navigating the everchanging cybersecurity space.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h4>Sector Implications</h4>
<p><span data-contrast="auto">To sustain effectiveness, the Regulations will greatly affect the following stakeholders:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li style="margin-bottom: .5rem;"><i><span data-contrast="auto">The general public will benefit from </span></i><i><span data-contrast="auto">the</span></i><i><span data-contrast="auto"> guidelines on cybersecurity responsibilities and rights.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><i><span data-contrast="auto">Owners of critical infrastructure will be tasked with adhering to stringent security measures and reporting requirements outlined in the Regulations.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><i><span data-contrast="auto">Internet Service Providers and Cybersecurity Service Providers must align operations with the Regulations to ensure compliance and enhance the overall security posture of the nation.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<h4>National Cyber Protection Framework: Enhancing Cybersecurity in Kenya</h4>
<p><span data-contrast="auto">Under the guidance of the National Computer and Cybercrimes Coordination Committee (the Committee), established under the Act, the government is set to implement a robust National Cyber Protection Framework to strengthen cybersecurity capabilities support educational initiatives, and promote information sharing. This would entail creating national cybersecurity training and capacity building, establishing a detailed cyber-defense strategy, and developing a trusted network or system for information sharing.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The Committee will also undertake collaborations with public bodies research institutions private sector and international organizations toward the development of training programs, create standards, conduct research, and develop policies. For instance, in establishment of the National Cybersecurity Certification Standards, will ensure compliance with security requirements and develop operational standards for security automation. This will mandate the Committee to maintain an up-to-date database for certified cybersecurity institutions and professionals to ensure transparency and credibility. This will be done through the creation and adoption of reference materialism checklists and policy frameworks to sustain continuous monitoring in a bid to minimize risks associated with information technology systems used by the government.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Additionally, the Committee will be instrumental in researching emerging technologies providing practical cybersecurity approaches, formulating administrative guides, and measuring the impact of training programs.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">With the framework in place, it will ensure a secure cyber environment and improvement of cybersecurity practices promote continuous learning, and help Kenya foster collaborations to combat cyber threats effectively.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h4>Critical Information Infrastructure</h4>
<p><span data-contrast="auto">Under the Act, Critical Information Infrastructure (CII) entails systems or data deemed essential for national security and public welfare located within Kenya. If disruption of such a system would result in interrupting sensitive services such as energy and health services, hence adversely affecting the Republic’s economy, causing massive casualties or fatalities, disrupting the money market significantly, and severely impacting national security including military and intelligence operations, it will be classified as CII. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">As such, the Regulations mandate owners or operators of CIIs and related sectors to conduct cyber risk assessments and business impact analyses within twelve (12) months of the Regulations’ commencement to identify and prioritize potential internal and external threats to all products, services, business processes, and functions. To ensure this, the Director of the Committee must inform the systems owner or operator of the designation of their infrastructure as CII within seven days. This directive will require the owner or operator to conduct risk assessments annually, develop incident response plans, implement suitable security measures, and ensure personnel are adequately trained in security best practices. The owner can also apply in writing to the Director for a system to be declared as CII and receive feedback from the Director within seven days. Significant changes to CII must be notified to the Director in advance such as plans to locate critical information outside Kenya which require the Committee&#8217;s approval in compliance with security standards.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The Regulations provide that CII must be protected with access restricted to authorized personnel. To ensure adherence and effective follow-up, a Chief Information Security Officer (CISO) must be appointed by the owner to oversee periodic reviews and awareness programs are conducted. Their presence is vital in ensuring a backup system is maintained to help information retrieval in case of loss as well as integration with other infrastructures once safety standards are met. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h5>Cybersecurity Operation Centres</h5>
<p><span data-contrast="auto">They will include:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">Critical Information Infrastructure Cybersecurity Operations Centres (CIICOC),</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="margin-bottom: .5rem;"><span data-contrast="auto">National Cybersecurity Operations Centre (NCOC), and</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li><span data-contrast="auto">Sector Cybersecurity Operations Centres (SCOC).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-contrast="auto">The CIICOC will undertake real-time monitoring, detection and investigation of threats to critical infrastructure, reporting to both national and sector centres. SCOC will focus on sector-specific threats and reporting to the national centre and the NCOC will serve as the primary point for national cybersecurity monitoring and investigation. Once these operations centres are in place, their main function in aiding the coordination of the collection and analysis of cyber threats through submission of monthly briefs and annual compliance reports to the committee to evaluate adherence. They shall also monitor, analyze and collect information in real time, analyze and test malware, detect, monitor and prevent threats, respond to and manage incidences, vulnerability management, act as an alert system and detect intrusion.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h5><i><span data-contrast="auto">Cyber Crime Reporting</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h5>
<p><span data-contrast="auto">In the event of a cybersecurity threat or incident, owners of critical information infrastructures will be required to facilitate investigations, mitigate the impacts of the incidents according to set cybersecurity standards and report these incidents to relevant Sectoral Cybersecurity Operations centres within a stipulated timeframe. This reporting will specify the type and description of the threat, attack or disruption along with relevant evidence such. These reports will be submitted electronically or physically to the Committee using CMCA 7 to ensure detailed reporting. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">With the establishment of computer crime and cyber crime desks manned by appropriately trained personnel at every police station, these will handle the reception, assessment and escalation of cyber threats and incidents. With personnel receiving specialized training in cybersecurity and digital forensics, public awareness campaigns will be conducted towards sensitizing the citizens and organizations on the role of the cybersecurity desks and reporting methods.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Most importantly, anonymous reporting channels will allow disclosure of cyber incidents or crimes without fear ensuring that such reporting is done in the public interest and based on reasonable belief in the veracity of the information. As such, the Regulations emphasize on implementation of the Data Protection Act 2019 when processing of personal data under the Act.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h5>Conclusion<span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h5>
<p><span data-contrast="auto">Safeguarding the nation’s digital infrastructure remains key for Kenya to mitigate cyber threats and ensure a secure digital space. Investing in advanced technologies and solutions, promoting a culture of cybersecurity awareness and fostering public-private partnerships will go a long way to ensure resilience and bolster economic growth. By integrating robust regulatory frameworks and fostering collaboration between stakeholders, the Regulations aim to safeguard critical information infrastructure, bolster cybersecurity defenses and reduce cyber incidents whilst in effect operationalizing the mandate of the Computer Misuse and Cybercrimes Act.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>The post <a href="https://netsheria.com/overview-of-the-computer-misuse-and-cybercrime-critical-information-infrastructure-and-cybercrime-management-regulations-2024/">Overview of the Computer Misuse and Cybercrime (Critical Information Infrastructure and Cybercrime Management) Regulations, 2024</a> appeared first on <a href="https://netsheria.com">Netsheria</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
