Group photos of the participants in Machakos in Enhancing Data Protection and Cyber Hygiene for Vulnerable Groups in Machakos

Advancing Data Protection and Online Safety. 

a.) Strengthening Data Protection in Kenya: Key Priorities

As we approach the International Women’s Day discussions, the second session of the Enhancing Data Protection and Cyber Hygiene for Vulnerable Groups workshop in Machakos, conducted with support from GIZ, highlighted critical issues surrounding digital safety and privacy. The session brought together diverse participants, including women, human rights defenders, and journalists, to discuss the pressing challenges they face, such as online gender-based violence (OGBV), arbitrary surveillance, and data misuse.

Through interactive discussions and practical exercises, participants explored key data protection principles, cybersecurity best practices, and strategies for navigating the digital space safely. The session featured Valarie Kutima, a representative of the Data Protection Office, who emphasized the growing need for robust data protection measures as Kenya continues to embrace digital transformation.

While the enactment of the Data Protection Act (2019) marked a significant milestone, gaps remain in its enforcement and compliance. Many organizations still struggle with full adherence due to limited awareness, technical challenges, and inadequate capacity.

“To strengthen data protection, there is a need for increased public awareness, enhanced enforcement by the Office of the Data Protection Commissioner (ODPC), and sector-specific guidelines that address emerging digital threats,” said Valarie.

Additionally, a well-resourced ODPC is essential to ensuring proper oversight, alongside collaboration between the government, private sector, and civil society to drive compliance and build trust in Kenya’s digital ecosystem. Beyond regulation, Kenya must invest in cybersecurity infrastructure and digital literacy programs to safeguard personal data effectively.

Businesses and government institutions should adopt privacy-by-design principles, ensuring data protection is integrated into all digital services from the outset. “Encouraging ethical data practices and promoting accountability through regular audits and penalties for non-compliance will further strengthen the country’s data protection landscape,” insisted Kutima.

By prioritizing these measures, Kenya can create a safer digital environment that upholds privacy rights while fostering innovation and economic growth

b.) Addressing Technology-Facilitated Gender-Based Violence

Technology has transformed how we communicate, work, and socialize. However, it has also created new avenues for harm, particularly for women and marginalized groups.

During a session led today by Cherie Oyier, key discussions revolved around technology-facilitated gender-based violence (TFGBV) and the urgent need to create safer digital spaces. 

“TFGBV includes acts committed, assisted, or amplified through digital platforms, such as cyberstalking, doxxing, online harassment, deep – fake misuse, and economic harm. Women in leadership roles, such as politicians, journalists, and human rights defenders, are particularly vulnerable to these digital threats,” said Oyier.

The session highlighted the importance of acknowledging these harms, advocating for policy interventions, and building awareness to empower individuals in protecting themselves online.

Research conducted in 2023, titled Unmasking Online Harms, explored TFGBV beyond Nairobi, uncovering alarming statistics: 54% of respondents had experienced some form of online abuse. The study also revealed the stigma surrounding male victims, emphasizing the need for inclusive support systems. As the digital landscape evolves, so must our approach to online safety and gender equality.

“Policies and regulations must be enforced to hold perpetrators accountable, while digital literacy programs can equip users with the skills to navigate and protect themselves from online threats,” said Cherie.

By promoting safer online environments, we contribute to a more inclusive and equitable digital space for all.

C) Cyber Hygiene: The Importance of Cyber Hygiene in a Rapidly Evolving Digital World. 

With the rapid advancement of technology, internet users face increasing cybersecurity threats daily. This makes cyber hygiene an essential practice for safeguarding personal and organizational data. But what does cyber hygiene look like in practice?

  • Me + My Device – Protecting access to our devices through strong passwords, biometrics, and multi-factor authentication.
  • My Device + The Internet – Ensuring secure network connections through encryption and authentication mechanisms.
  • App + Internet – Managing app permissions (data, location) and implementing authentication measures to access applications securely.

During an enlightening session on cyber hygiene, Jacinta emphasized, “Strengthening our digital habits isn’t just a personal responsibility—

it’s a collective effort to build a safer internet for all.”

d.) Reporting Mechanisms and Legal Redress.

While practicing caution on social media can help prevent falling victim to scammers, it is equally important to know how to report incidents when they occur. Reporting is a crucial step in seeking justice and ensuring accountability. By utilizing available legal frameworks and reporting mechanisms, individuals can protect themselves and contribute to a safer digital environment for all.

As KICTANet continues to champion digital rights and cybersecurity, these discussions highlight the urgent need for strengthened data protection, safer online spaces, and improved digital literacy. By collaboration among policymakers, private sector players, and civil society, Kenya can build a resilient digital ecosystem that upholds privacy, promotes accountability, and ensures inclusivity.

Loading

Neema Mujesia information

Related Posts

Submit a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.