Saturday, 8 April 2017

Uganda's Computer Misuse ACT 2011 and the Public Collections Act 1966

Nyanzi (middle) at the Human Rights Convention at Kabira on Thursday.
She was picked up by police on Friday after a presentation at a Rotary Club function

Soon after Uganda Police confirmed Friday's arrest of outspoken feminist, academic and government critic Dr Stella Nyanzi, Kampala Metropolitan spokesman Emilian Kayima indicated she would be charged on Monday. 

"She kept posting issues, fighting battles on social media which we think does not serve her interests or ours," Kayima told AFP.

He said Nyanzi would appear in court Monday in Kampala on charges of cyber harassment and offensive communication (sections 24 & 25) under a 2011 law governing computer misuse. 

Using sexual innuendos, Nyanzi criticised First Lady Janet Museveni, who is education minister, on Facebook and Twitter after the NRM government reneged on a campaign pledge to supply free sanitary pads to schoolgirls.

Other reports indicate that police also interrogated Stella for raising money from the public, for her sanitary pad campaign, without registration contrary to the Public Collections Act, 1966. (FULL ACTS BELOW)


What is the Computer Misuse ACT, 2011?

According to National Information Technology Authority (NITA), the act makes provision for the safety and security of electronic transactions and information systems. It makes provision for the safety and security of electronic transactions and information systems; prevent unlawful access, abuse or misuse of information systems by including computers (and electronic devices like mobile phones ) and make provision for securing the conduct of electronic transactions in a trustworthy electronic environment and to provide for other related matters.
  1. The Act takes cognizance of the fact that all computer operations are susceptible to computer crimes and our current legal system does not recognize computer crimes thus the importance of a legislation to provide for computer crimes.
  2. It creates several computer misuse offences e.g. unauthorized modification of computer material
  3. Lays down mechanisms for investigation and prosecution of the offences.




No comments:

Post a Comment