Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Enacting of laws to regulate the use of cyberspace for instance to deter and punish cyber crimes and other unethical use of ICT
2. Review existing legal systems to ensure they appropriately criminalize abuses of telecommunications and computer systems and promote the investigation of high-tech crimes.
3. Development of institutional and national policies to guide use of ICT. These policies include :
- copyright responsibilities
- imposition of censorship rules
- user rights and responsibilities i.e. connecting user’s rights such as freedom of expression and freedom from persecution and responsibilities
Policies protect organizations or companies and its employees from legal actions. If an employee violates an organization’s policies in handling a client’s data, he/she will be held personally liable and not the organization.
4. Enhancing regional and international cooperation on information security
5. Cooperation between oversight bodies such as Communications Commission of Kenya e.g. in sharing incident reports
6. Holding public education seminars related to incident prevention
7. Publish and distribute various types of technological documents to prevent hackings and viruses
8. Development of technologies to prevent incidents.
Kavungya answered the question on May 17, 2019 at 08:33
- Describe the data protection act.(Solved)
Describe the data protection act.
Date posted: May 17, 2019. Answers (1)
- State the sources of ICT legislation.(Solved)
State the sources of ICT legislation.
Date posted: May 17, 2019. Answers (1)
- Outline the types of workplace conflicts.(Solved)
Outline the types of workplace conflicts.
Date posted: May 17, 2019. Answers (1)
- Give the effects of conflicts in organizations.(Solved)
Give the effects of conflicts in organizations.
Date posted: May 17, 2019. Answers (1)
- State and explain the methods of dealing with conflicts.(Solved)
State and explain the methods of dealing with conflicts.
Date posted: May 17, 2019. Answers (1)
- List the techniques of reducing conflicts.(Solved)
List the techniques of reducing conflicts.
Date posted: May 17, 2019. Answers (1)
- Explain the techniques of stimulating conflicts.(Solved)
Explain the techniques of stimulating conflicts.
Date posted: May 17, 2019. Answers (1)
- List the ways on how to solve interpersonal conflicts.(Solved)
List the ways on how to solve interpersonal conflicts.
Date posted: May 17, 2019. Answers (1)
- Describe E-Environment.(Solved)
Describe E-Environment.
Date posted: May 17, 2019. Answers (1)
- Describe E-Health.(Solved)
Describe E-Health.
Date posted: May 17, 2019. Answers (1)
- Describe E-Government.(Solved)
Describe E-Government.
Date posted: May 17, 2019. Answers (1)
- Describe cloud computing.(Solved)
Describe cloud computing.
Date posted: May 17, 2019. Answers (1)
- Describe E-Agriculture.(Solved)
Describe E-Agriculture.
Date posted: May 17, 2019. Answers (1)
- Describe technology transfer.(Solved)
Describe technology transfer.
Date posted: May 17, 2019. Answers (1)
- State the Types of Technology Transfer.(Solved)
State the Types of Technology Transfer.
Date posted: May 17, 2019. Answers (1)
- Briefly describe the history of computers.(Solved)
Briefly describe the history of computers.
Date posted: May 17, 2019. Answers (1)