KENYA
Since December 2001, entry into force in February 2003, last amended in October 2019
Pillar Intermediary liability |
Sub-pillar Safe harbour for intermediaries for copyright infringement
Copyrights Act No.12 of 2001 (Revision of 2019)
The Copyright Act establishes a safe harbour regime for intermediaries for copyright infringements. Section 35A of the Act outlines the limitations of liability for Internet Service Providers (ISPs) in cases of copyright infringement. ISPs may rely on these limitations under the following conditions:
- They do not initiate the transmission of the copyright;
- They do not select the addressee of the content;
- They perform their functions in an automatic, technical manner without selection of materials;
- They do not interfere with the lawful use of technology to obtain information on the use of the copyrighted material;
- They do not have actual knowledge that the content or activity related to the material is infringing the rights of a third party;
- They are not aware of the facts or circumstances of the alleged copyright infringing activity unless the infringing nature of the material is apparent and
- They remove or disable access to copyright-infringing content upon receipt of a valid takedown notice.
- They do not initiate the transmission of the copyright;
- They do not select the addressee of the content;
- They perform their functions in an automatic, technical manner without selection of materials;
- They do not interfere with the lawful use of technology to obtain information on the use of the copyrighted material;
- They do not have actual knowledge that the content or activity related to the material is infringing the rights of a third party;
- They are not aware of the facts or circumstances of the alleged copyright infringing activity unless the infringing nature of the material is apparent and
- They remove or disable access to copyright-infringing content upon receipt of a valid takedown notice.
Coverage Internet intermediaries
KENYA
N/A
Pillar Intermediary liability |
Sub-pillar Safe harbour for intermediaries for any activity other than copyright infringement
Lack of intermediary liability framework in place beyond copyright infringements
A basic legal framework on intermediary liability beyond copyright infringement is absent in Kenya's law and jurisprudence. Except for the provisions in Section 35 of the Copyright Act, there are no explicit limitations on liability for activities such as "hosting, caching, linking, or acting as mere conduits." The Electronic Transactions Bill of 2007, which was eventually repealed, had proposed limitations on both criminal and civil liability for third parties involved in caching, information location, and conduit functions, drawing extensively from the EU Commerce Directive.
Coverage Internet intermediaries
Sources
- https://web.archive.org/web/20211205060718/http://kenyalaw.org:8181/exist/kenyalex/actviewbyid.xql?id=KE/LEG/EN/AR/C/NO.%2012%20OF%202001#KE/LEG/EN/AR/C/NO.%2012%20OF%202001
- https://web.archive.org/web/20220331131102/http://www.parliament.go.ke/sites/default/files/2018-09/COPYRIGHT%20(AMENDMENT)%20BILL.pdf
- https://cipesa.org/?wpfb_dl=254
- https://web.archive.org/web/20170815182921/https://www.apc.org/sites/default/files/READY%20-%20Intermediary%20Liability%20in%20Africa_FINAL.pdf
- Show more...
KENYA
Since August 2005
Pillar Intermediary liability |
Sub-pillar User identity requirement
Registration of SIM –Cards Regulations, 2015
Regulation 5 of the Registration of SIM-Cards Regulations requires every telecom operator to register its users, including the provision of personal data such as names and national identity cards.
Coverage Telecommunications sector
KENYA
Since March 2009
Since July 2017
Since July 2017
Pillar Intermediary liability |
Sub-pillar Monitoring requirement
National Cohesion And Integration Act No. 12 of 2008
Guidelines on Prevention of Dissemination of Undesirable Bulk and Premium Rate Political Messages and Political Social Media Content Via Electronic Communications Networks
Guidelines on Prevention of Dissemination of Undesirable Bulk and Premium Rate Political Messages and Political Social Media Content Via Electronic Communications Networks
Section 13 of Act No. 12 creates the offence, and outlaws hate speech, and Section 62 makes an offence for any media enterprise to publish words intended to incite feelings of contempt, hatred, hostility, violence or discrimination against any person, group or community on the basis of ethnicity or race. A media enterprise can be fined up to one million shillings (USD 8,800) for publishing hate speech.
In addition, under the "Guidelines for the Prevention of Dissemination of Undesirable Bulk Political SMS and social media content via Electronic Communications Networks", intermediaries (bulk messaging and social media service providers) can be held liable for spreading falsehoods, hate speech and insults. Art. 13.6 of the Guidelines establishes that it shall be the responsibility of the Administrator of a social media platform to moderate and control undesirable content and discussions that have been brought to their attention on their platform. In this respect, Art. 13.7 provides that social media service providers shall be required to pull down accounts used in disseminating undesirable political content on their platform that have been brought to their attention within 24 hours.
In addition, under the "Guidelines for the Prevention of Dissemination of Undesirable Bulk Political SMS and social media content via Electronic Communications Networks", intermediaries (bulk messaging and social media service providers) can be held liable for spreading falsehoods, hate speech and insults. Art. 13.6 of the Guidelines establishes that it shall be the responsibility of the Administrator of a social media platform to moderate and control undesirable content and discussions that have been brought to their attention on their platform. In this respect, Art. 13.7 provides that social media service providers shall be required to pull down accounts used in disseminating undesirable political content on their platform that have been brought to their attention within 24 hours.
Coverage Media and bulk messaging and social media service providers
Sources
- https://web.archive.org/web/20230327012713/https://cohesion.or.ke/index.php/resources/policies-and-regulations?download=29:national-cohesion-and-integration-act-2008
- https://web.archive.org/web/20231208161615/https://wilmap.stanford.edu/entries/national-cohesion-and-integration-act-no-12-2008
- https://freedomhouse.org/country/kenya/freedom-net/2022
- https://cipesa.org/?wpfb_dl=254
- https://web.archive.org/web/20211002220610/https://www.ca.go.ke/wp-content/uploads/2018/02/Guidelines-on-Prevention-of-Dissemination-of-Undesirable-Bulk-and-Premium-Rate-Political-Messages-and-Politic...
- Show more...
KENYA
Since October 1998, entry into force in February 1999, as amended in 2020
Since February 2001
Since February 2001
Pillar Content access |
Sub-pillar Licensing schemes for digital services and applications
Kenya Information and Communications Act, 1998
Kenya Communications Regulations, 2001
Kenya Communications Regulations, 2001
The Communications Authority of Kenya (CA) is mandated to license all telecommunications systems and services in the country, including content service providers. The Content Service Provider licence allows a licensee to provide content-related services to end users who are customers of the application service providers. Content service providers use the infrastructure of network facilities providers and the application service providers' systems to reach their customers. The services offered by content service providers are of information, entertainment, education, health, social, etc. nature, which can either be text, voice, or video clips delivered to a customer’s mobile device on request or as subscribed to by the customer.
CA is guided by the provisions of the relevant statutes, including the Kenya Information and Communications Act, 1998 (Section 25) and the Kenya Communications Regulations 2001 (Part V). The CA has a Unified Licensing Framework (ULF) in place, which is technology- and service-neutral. The ULF market is structured into three main licenses: Network Facilities Provider, Application Service Provider, and Content Service Provider.
CA is guided by the provisions of the relevant statutes, including the Kenya Information and Communications Act, 1998 (Section 25) and the Kenya Communications Regulations 2001 (Part V). The CA has a Unified Licensing Framework (ULF) in place, which is technology- and service-neutral. The ULF market is structured into three main licenses: Network Facilities Provider, Application Service Provider, and Content Service Provider.
Coverage Content service providers, application service providers
Sources
- https://web.archive.org/web/20220711042503/https://www.ca.go.ke/wp-content/uploads/2021/02/Kenya-Information-and-Communication-Act-1998.pdf
- https://web.archive.org/web/20201102132039/https://www.ca.go.ke/industry/telecommunication/licensing-procedure/
- https://web.archive.org/web/20200920105521/https://www.ca.go.ke/industry/telecommunication/market-structure/
- https://web.archive.org/web/20220120000720/https://www.ca.go.ke/wp-content/uploads/2018/02/The-Kenya-Communications-Regulations-2001-1.pdf
- Show more...
KENYA
Since February 2021
Pillar Quantitative trade restrictions for ICT goods and online services |
Sub-pillar Other import restrictions, including non-transparent/discriminatory import procedures
The Environmental Management and Coordination (Extended Producer Responsibility) Regulations of 2021
The Environmental Management and Coordination (Extended Producer Responsibility) Regulations impose obligations for importers of used electronic goods such as licences, registration for compliance schemes and reporting to ensure that the products comply with the Extended Producer Responsibility (EPR), amongst other requirements.
Coverage Used electronic goods, including electronic equipment
KENYA
N/A
Pillar Quantitative trade restrictions for ICT goods and online services |
Sub-pillar Other import restrictions, including non-transparent/discriminatory import procedures
Pre-export verification of conformity (PVoC)
It is reported that there is a requirement to obtain a Certificate of Conformity from a Kenya Bureau of Standards appointed pre-export verification of conformity (PVoC) partner. To import any commodity into Kenya, an importer has to enlist the services of a clearing agent who will process the import documentation through Kenya Customs electronically on the Simba 2005 system and clear the goods on the company's behalf. It is the seller’s responsibility to ensure that shipments to Kenya happen only after issuance of a Certificate of Conformity. In addition, products containing the QMark do not have to go through inspection for compliance upon entry into another Partner State of the East African Community.
Coverage Horizontal
KENYA
Reported in 2022, last reported in 2023
Pillar Quantitative trade restrictions for ICT goods and online services |
Sub-pillar Other import restrictions, including non-transparent/discriminatory import procedures
Lack of transparency of import procedures
Companies have expressed concerns regarding the prolonged duration for Kenyan Customs to release shipments, along with the excessive formalities involved. The one-stop customs clearance system in Kenya reportedly does not function as expected, and the pre-arrival processing of electronic documents is ineffective. Additionally, there are reports of inconsistent application of classification and valuation decisions within the system, as well as unnecessary transit inspections.
Coverage Horizontal
KENYA
Reported in 2022
Pillar Technical standards applied to ICT goods and online services |
Sub-pillar Self-certification for product safety
Self-certification not allowed for foreign businesses
According to the Communications Authority of Kenya, an application for Type Approval must be made using the Application Form for Type Approval/Type Acceptance of ICT Equipment. It is reported that the homologation procedure in Kenya is more complicated than in most African countries. Depending on regulations and type of equipment, the authority may require product samples for further examination or simply issue an exemption letter. The validity period of conformity documents can be unlimited (exemption letters) or limited to 6 months (certificates of conformity) after which the authority automatically issues an unlimited certificate.
Coverage ICT equipment
KENYA
Since August 2015
Pillar Domestic data policies |
Sub-pillar Minimum period for data retention
The Kenya Information and Communications Act (Registration of SIM Cards) Regulations 2015
While The Kenya Information and Communications Act (Registration of SIM Cards) Regulations 2015 does not specify any period of retention of data, Section 4.4 requires that the telecommunications companies provide quarterly records of all registered SIM Cards and a report of the maintenance of the records of SIM Cards registered as under the Regulations. This inadvertently means that there is a requirement for these record of SIM Card registration almost indefinitely and the Kenya Communications Authority expects regular updates.
Coverage Telecommunications sector
KENYA
Since 2019
Pillar Domestic data policies |
Sub-pillar Minimum period for data retention
Guidelines for Reporting on SIM-Card Registration by Telecommunications Operators of 2019
Guide 7 of the 2019 Guidelines for Reporting on SIM-Card Registration by Telecommunications Operators outlines various measures that operators must follow in the SIM card registration process. Although the retention period is not explicitly specified, it is anticipated that the data collected for each mobile user should be retained for as long as the user holds the telecom's SIM card and continues to use their services.
Coverage Telecommunications sector
KENYA
Since November 2011
Pillar Domestic data policies |
Sub-pillar Minimum period for data retention
National Payment System Act No. 39 of 2011
Section 26.1 of the National Payment Act provides that the Central Bank, the Central Bank settlement system participants, payment clearing house system operators and system operators shall retain all records obtained by them during the course of the operations and administration of a payment system or the issuance of a payment instrument, for a period of seven years from the date of each particular record.
Coverage Financial sector
KENYA
N/A
Pillar Intellectual Property Rights (IPRs) |
Sub-pillar Adoption of the World Intellectual Property Organization (WIPO) Performances and Phonogram Treaty
Lack of ratification of the WIPO Performances and Phonogram Treaty
Kenya has signed the World Intellectual Property Organization (WIPO) Copyright Treaty in December 1996, but has not ratified it.
Coverage Horizontal
KENYA
Since November 2019
Pillar Domestic data policies |
Sub-pillar Requirement to perform a Data Protection Impact Assessment (DPIA) or have a data protection officer (DPO)
Data Protection Act (No. 24 of 2019)
Section 31 of the Data Protection Act No. 24 of 2019 requires the performance of protection impact assessment in cases where a processing operation is likely to result in high risk to the rights and freedoms of a data subject by virtue of its nature, scope, context and purposes.
Coverage Horizontal
KENYA
N/A
Pillar Intellectual Property Rights (IPRs) |
Sub-pillar Effective protection covering trade secrets
Lack of effective protection of trade secrets
Kenya does not have a comprehensive framework in place that provides effective protection of trade secrets, but there are limited measures addressing some issues related to them. The protection of trade secrets is mostly by way of common law and equity (and there are a few judicial decisions on this topic). Trade secret protection can be inferred from common law protection of confidentiality. However, regarding whether trade secrets are kept confidential during court proceedings, there is currently no clear judicial precedent on the handling of evidence containing a trade secret while still maintaining its confidentiality. A review of the available case law shows that such matters are determined on a case-by-case basis, and one must demonstrate that the trade secret is indeed useful and applicable in the relevant trade or industry; is not public knowledge or public property; is of economic value to the business seeking to protect it and that the disclosure of such information would be prejudicial to the business.
Moreover, protection is granted locally by virtue of the Constitution (Arts. 2.5 and 2.6). Some forms of protection of trade secrets can also be found in various pieces of legislation, such as those relating to employment and contracts.
Moreover, protection is granted locally by virtue of the Constitution (Arts. 2.5 and 2.6). Some forms of protection of trade secrets can also be found in various pieces of legislation, such as those relating to employment and contracts.
Coverage Horizontal
Sources
- https://web.archive.org/web/20230917094509/https://www.wipo.int/edocs/lexdocs/laws/en/ke/ke019en.pdf
- https://web.archive.org/web/20231220053747/https://www.wto.org/english/docs_e/legal_e/27-trips.pdf
- https://web.archive.org/web/20231130104544/https://www.lexology.com/library/detail.aspx?g=874289b3-d36c-4abe-9b0d-63034983973b
- https://web.archive.org/web/20231203132635/https://www.bowmanslaw.com/insights/intellectual-property/how-to-strengthen-protection-and-enforcement-of-trade-secrets-in-east-africa/
- https://web.archive.org/web/20231206215859/https://bowmanslaw.com/insights/intellectual-property/patent-or-trade-secrets-which-offers-better-protection/
- Show more...