I-Network is an ICT for development (ICT4D) organization that is mainly supported by the International Institute for Communication and Development (IICD).

Follow us on Twitter
From a member on the I-Network mailing list PDF Print E-mail

By Paul Bagyenda

Section 10 of the Bill is very dangerous to the IT community and business.  Please remove it. By the way it will also be very lucrative for businesses.

There are too many loopholes in the Bill. It can be interpreted that someone can bring a laptop to an IT expert to be opened. There is no provision in section 10 that caters for inability to crack a computer.  All someone from CMI has to say is that they know you can open the laptop because you are an IT expert and that is it.

If I am brought Baliddawa’s laptop and told to open it and cannot do it then I go to jail for 5 years!!

Secondly what of businesses, which use passwords as part of their daily activities like banks, telecom and insurance companies, USAID etc.

Some of those passwords are kept in South Africa and the United States. For instance if there is a tax dispute between MTN and Uganda Revenue Authority over this new Mobile Money then the IT people will be put to task to reveal passwords they do not have!  There is no provision in the Bill to protect them.

I am very worried about the potential for abuse.  I can setup an email today called This e-mail address is being protected from spambots. You need JavaScript enabled to view it and then send out an email talking about how we are friends and its been a long time and that I am stuck somewhere and need help.  The recipient can ignore the letter and delete it.

The next day someone knocks on the recipient’s door and asks to look at his laptop (as no court order is needed with proof of suspicion). So they open the laptop and the visitor checks his email and in the trash is an email from Joseph Kony.

Based on that one piece of evidence you are in big trouble and it allows people to sift through your entire laptop for free. If they have a court order they would have had to first prove you are a threat and have been observed talking with rebel sympathizers before etc.  Now they make up the evidence, act on it and arrest you while they do a proper search. Getting evidence before crime is wrong
Joomla Templates and Joomla Extensions by JoomlaVision.Com

To participate in ICT for development discussions, subscribe to our mailing list by sending an email with your full name, country of residence, job title and address to admin@i-network.or.ug

You could also fill out the form on Dgroup: I-Network Uganda.

More information on the mailing list can be found at http://www.dgroups.org

Follow I-Network updates on: