<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>acelitigator</title>
	<atom:link href="https://acelitigator.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://acelitigator.com</link>
	<description></description>
	<lastBuildDate>Fri, 15 Nov 2024 05:18:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://acelitigator.com/wp-content/uploads/2024/07/cropped-cropped-new-small-ace-logo-32x32.png</url>
	<title>acelitigator</title>
	<link>https://acelitigator.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Moiz Motors Limited v Oprisianu &#038; 3 others (Civil Appeal E285 of 2024) [2024] KEHC 13337 (KLR) (Civ) (31 October 2024) (Ruling) </title>
		<link>https://acelitigator.com/moiz-motors-limited-v-oprisianu-3-others-civil-appeal-e285-of-2024-2024-kehc-13337-klr-civ-31-october-2024-ruling/</link>
					<comments>https://acelitigator.com/moiz-motors-limited-v-oprisianu-3-others-civil-appeal-e285-of-2024-2024-kehc-13337-klr-civ-31-october-2024-ruling/#respond</comments>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Fri, 15 Nov 2024 05:18:14 +0000</pubDate>
				<category><![CDATA[Landmark Judgements]]></category>
		<guid isPermaLink="false">https://acelitigator.com/?p=56228</guid>

					<description><![CDATA[The applicant sought a stay of execution of the judgment pending the lodging of the appeal. The applicant had initially sought a review of the judgment. ]]></description>
										<content:encoded><![CDATA[<p><b><span data-contrast="auto">Is a party allowed to appeal after seeking a review of a decision?</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><a href="https://new.kenyalaw.org/akn/ke/judgment/kehc/2024/13337/eng@2024-10-31"><b><span data-contrast="none">Moiz Motors Limited v Oprisianu &amp; 3 others (Civil Appeal E285 of 2024) [2024] KEHC 13337 (KLR) (Civ) (31 October 2024)</span></b></a><b><span data-contrast="auto"> (Ruling)</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">A.N. Ongeri-Judge</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Brief facts</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The applicant sought a stay of execution of the judgment pending the lodging of the appeal. The applicant had initially sought a review of the judgment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Issues for determination</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Can a party appeal against a reviewed decision?</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Was the applicant entitled to stay of execution?</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Rule of law</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Order 45 Rule 1 of the Civil procedure Rules and Section 80 of the Civil Procedure Act provide that a party may seek a review from the same court that issued a decision for the judicial officer to relook at the decision. Some of the grounds are the discovery of new and important evidence, an error in the face of the record and any other sufficient reason.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Order 42 rule 6 of the Civil Procedure Rules provides that on application of a party, the court may order a stay of execution pending determination of an appeal.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Holding and reasoning of the court</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The court held that the right to review does not extinguish the right to appeal since at the time he lodged an application for review, he did not prefer an appeal. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">In allowing the stay of execution of the court directed that the stay was justified since the appeal was arguable and directed the applicant to furnish the whole decretal amount as security.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Disposition</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The court granted the applicant leave to appeal out of time.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The court granted stay pending appeal of the decision.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:360}"> </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://acelitigator.com/moiz-motors-limited-v-oprisianu-3-others-civil-appeal-e285-of-2024-2024-kehc-13337-klr-civ-31-october-2024-ruling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is the Public Appointments Act, 2011 a Tool for Parliamentary Gatekeeping or a Catalyst for Good Governance? </title>
		<link>https://acelitigator.com/is-the-public-appointments-act-2011-a-tool-for-parliamentary-gatekeeping-or-a-catalyst-for-good-governance/</link>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Wed, 07 Aug 2024 04:51:54 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://acelitigator.com/?p=56058</guid>

					<description><![CDATA[As the vetting of cabinet nominees begins, a growing number of Kenyans are taking a keen interest in public appointments, driven by a desire for good governance.]]></description>
										<content:encoded><![CDATA[<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><span data-contrast="auto">As the vetting of cabinet nominees begins, a growing number of Kenyans are taking a keen interest in public appointments, driven by a desire for good governance. The National Assembly issued a call for submissions on the suitability of nominees, and Kenyans responded in large numbers. However, the Speaker’s announcement that only 186 out of over 1,300 submissions met the legal threshold left many surprised and frustrated.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><span data-contrast="auto">The legal threshold referred to here is to be found in the Public Appointments (Parliamentary Approval) Act, 2011.See </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><a href="http://www.parliament.go.ke/sites/default/files/2017-05/PublicAppointmentsParliamentaryApprovalAct_No33of2011.pdf"><span data-contrast="none">http://www.parliament.go.ke/sites/default/files/2017-05/PublicAppointmentsParliamentaryApprovalAct_No33of2011.pdf</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span><span data-contrast="auto">This Act was established to bring transparency and accountability to public office appointments in Kenya, outlining the process for parliamentary approval, including nomination notification, vetting, public hearings, and final decisions. It also exists at the county level under the County Assembly (Public Approval) Act.</span> <a href="https://www.baringoassembly.go.ke/index.php/devolved-acts?download=189:public-appointments-county-assemblies-approval-act-no5-of-2017"><span data-contrast="none">https://www.baringoassembly.go.ke/index.php/devolved-acts?download=189:public-appointments-county-assemblies-approval-act-no5-of-2017</span></a><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Some key provisions of the Act include:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Notification of Nomination: The appointing authority must inform Parliament in writing of any nomination requiring approval.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Approval Hearings: A parliamentary committee conducts open hearings to assess nominees&#8217; qualifications, integrity, and background.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Criteria for Vetting: A detailed questionnaire helps evaluate the nominee’s suitability.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Timelines: The committee has 14 days to report on the nomination; inaction results in automatic approval.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Rejection and Resubmission: If a nomination is rejected, the appointing authority must propose a new candidate.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Powers of the Committee: The committee has High Court-like powers to summon witnesses and take evidence.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-contrast="auto">Of great importance to the discourse at hand is the form and content of submission made by the Public. The Act mandates that public submissions be made in </span><b><span data-contrast="auto">writing and under oath</span></b><span data-contrast="auto">. Proponents argue that these stringent requirements uphold high standards by filtering out poorly founded or malicious objections, ensuring that only serious and credible concerns are considered.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">However, this rigorous approach can also act as a barrier, potentially excluding legitimate concerns. The Act’s emphasis on formal criteria over substance raises questions about inclusivity and citizen participation in the democratic process. This situation highlights the need for greater civic education to ensure the public understands the Act’s provisions and the importance of following them.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">While the Act aims to ensure integrity and efficiency in public appointments, its current implementation may risk overlooking critical information. The balance between rigorous standards and flexibility must be reassessed to ensure that the vetting process truly contributes to selecting competent and trustworthy public officials.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">As interest in governance grows, so will the number of submissions and memoranda in public processes. Don’t let technicalities silence your voice on critical governance issues. For expert assistance in drafting and submitting memoranda that meet the required thresholds, reach out today at </span><a href="mailto:info@acelitigator.com"><span data-contrast="none">info@acelitigator.com</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Should an employer approve a resignation from an employee to deem it effective? </title>
		<link>https://acelitigator.com/should-an-employer-approve-a-resignation-from-an-employee-to-deem-it-effective/</link>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 08:46:56 +0000</pubDate>
				<category><![CDATA[Landmark Judgements]]></category>
		<guid isPermaLink="false">https://acelitigator.com/?p=56034</guid>

					<description><![CDATA[This case has outlined that the validity of an employee’s resignation is not dependent on the employer accepting it since it is a unilateral contract. ]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_empty_space"   style="height: 82px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h2 style="text-align: center;"><span class="TextRun SCXW128024687 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW128024687 BCX0">Should an employer approve a resignation from an employee to </span><span class="NormalTextRun SCXW128024687 BCX0">deem</span><span class="NormalTextRun SCXW128024687 BCX0"> it effective?</span></span><span class="EOP SCXW128024687 BCX0" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></h2>
<p style="text-align: center;"><a href="http://kenyalaw.org/caselaw/cases/view/281484/"><b><span data-contrast="none">Apudo v Azure Hotel Limited (Cause 816 of 2018) [2024] KEELRC 321 (KLR) (22 February 2024)</span></b></a><b><span data-contrast="auto"> (Judgment)</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p style="text-align: center;"><b><span data-contrast="auto">Dr. Jacob Gakeri -Judge</span></b></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">Significance of the case</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">This case has outlined that the validity of an employee’s resignation is not dependent on the employer accepting it since it is a unilateral contract.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">It further acknowledges that an employee is only capable of being dismissed when the employment relationship still exists. The employment connection ends when an employee submits their resignation, and there is no right to a subsequent claim on summary dismissal.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">It has also stated that if the employee breaches the contract of employment an employer may dismiss an employee without serving them a notice or issue the employee less notice than is legally required.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Additionally, it has outlined that duress exists where a party uses threats or violence to have another individual act in a way that is advantageous to them.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The case has also outlined that an employee may only utilize a claim constructive dismissal for a limited period of time. Upon lapse of the time, the employee cannot fault the employer’s actions that prevented them from fulfilling their contractual obligation.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Facts</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The claimant and the respondent were in an employment relationship which was brought to an end in unclear circumstances.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Claimant’s arguments</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The claimant stated that the Human Resource Manager, Mr. Wanjau had called him to his office, offered him a paper and pen and dictated to him the contents of the resignation letter while threatening him and as such, the letter was not written voluntarily. She stated that Mr. Wanjau threatened that she will not leave the office if she did not write and sign the resignation letter. She further averred that Mr. Wanjau threatened to call security if she did not sign the letter. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Respondent’s arguments</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The respondent averred that the claimant wrote the resignation letter willingly and voluntarily and upon issuing the same to the human resource manager, the same was accepted. It was the respondent’s case that the claimant had been summoned to question his performance when he decided to write the resignation letter. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Issues for Determination</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<ol>
<li><span data-contrast="auto">Whether the Claimant was summarily dismissed by the Respondent. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}">
<p></span></li>
<li><span data-contrast="auto">Whether the claimant resigned from employment</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}">
<p></span></li>
<li><span data-contrast="auto">Whether the claimant was constructively dismissed by the respondent</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}">
<p></span></li>
<li><span data-contrast="auto">Whether the Claimant is entitled to the reliefs sought.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></li>
</ol>
<p><b><span data-contrast="auto">Holding and reasoning of the court</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The court held that the claimant had not been summarily dismissed because no evidence was adduced before court to prove that the respondent actually terminated the employment without notice or without the statutory required notice duration. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The claimant failed to prove that the letter stating that he intended to terminate his employment voluntarily was not a resignation. As a result, it was regarded as the claimant&#8217;s voluntary resignation letter. A resignation letter was deemed to take effect immediately and did not depend on the acceptance by the employer.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The claimant failed to adduce evidence to demonstrate that the conduct of the employer made it impossible to adhere to the employment contract to demonstrate constructive dismissal.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The court decided that all statutory deductions, including Pay As You Earn, are applicable to terminal dues that an employee owes. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The court held that the claimant had failed to establish her case and as such, she was not entitled to the reliefs sought except for the certificate of service.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>

		</div>
	</div>
</div></div></div></div>
</div>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding Your Rights and Responsibilities Under Kenyan Law</title>
		<link>https://acelitigator.com/understanding-your-rights-and-responsibilities-under-kenyan-law/</link>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 08:36:06 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://acelitigator.com/?p=56023</guid>

					<description><![CDATA[ Recent events in Kenya have sparked widespread civic education about our laws, many of which remain unknown to the public.]]></description>
										<content:encoded><![CDATA[<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-contrast="auto">Recent events in Kenya have sparked widespread civic education about our laws, many of which remain unknown to the public. You&#8217;ve probably heard the saying, &#8220;ignorance of the law is no defense.&#8221; As a protester, whether you&#8217;re demonstrating on the streets or advocating online, it&#8217;s crucial to know that your rights are protected by the Constitution. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">However, it&#8217;s equally important to understand that these rights come with certain limitations.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">We have  witnessed a surge in online activity, with some individuals finding themselves arrested and charged under various laws. This highlights a critical point: while we demand accountability and transparency from our leaders, we must also hold ourselves to the same standards. What applies to the governing should equally apply to the governed.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">In today&#8217;s discussion, let&#8217;s focus on the Computer Misuse and Cybercrimes Act No. 5 of 2018. </span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">The objectives of this Act are to:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Safeguard Privacy and Security: Protect the confidentiality, integrity, and availability of computer systems, programs, and data.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Prevent Cybercrimes: Stop the unlawful use of computer systems.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Support Law Enforcement: Aid in the prevention, detection, investigation, prosecution, and punishment of cybercrimes.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Uphold Constitutional Rights: Ensure the protection of privacy, freedom of expression, and access to information.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Foster International Cooperation: Facilitate global efforts in combating cybercrimes.</span>&nbsp;</li>
</ul>
<p><b><span data-contrast="auto"> Which court has jurisdiction to try offences under this Act </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Any court in Kenya can try offences under this Act if the offence was committed in Kenya. An offence committed outside Kenya is treated as if it were committed in Kenya if:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The person is a Kenyan citizen or ordinarily resides in Kenya.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">The act is against a Kenyan citizen, Kenyan government property outside Kenya, or to compel the Kenyan government to act.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">The person is present in Kenya after committing the act.</span>&nbsp;</li>
</ul>
<p><b><span data-contrast="auto">Can the court order forfeiture of equipment used to commit offence under this Act?</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If convicted, the court can order the forfeiture of any equipment used in the offence to the relevant authority.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">What if there are other laws with conflicting provision on cybercrimes?</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If there&#8217;s a conflict between this Act and any other law on cybercrimes, this Act takes precedence.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">A sound understanding of the offences under these Acts and their penalties will helps us navigate our actions responsibly and stay within the bounds of the law while advocating for change using online fora. The following are the offences prescribed under the Act:</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">Unauthorized Access</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Access is unauthorized if the person:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Does not have the right to control access to the program or data.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Does not have permission from someone who has the right to access the computer system.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<p><span data-contrast="auto">Please note that it does not matter that the unauthorized access was not aimed at</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">a specific program or data or any type of program or data or a particular computer system.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If you intentionally bypass security measures to access a computer system without authorization, you commit this offence and if convicted of it, you may face a fine up to five million shillings or   a jail term of up to three years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">Access with Intent to Commit a Further Offence:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">It is an offence for you to accesses a computer system intending to commit another offence. If convicted you can be fined up to ten million shillings, imprisoned for up to ten years, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Please note that it doesn’t matter when the further offence is committed, whether at the same time as the unauthorized access or later.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">1. Unauthorized Interference:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The interference is unauthorized if the person if you the person who has caused the interference is not entitled to cause the interference or you do not have consent from someone entitled to access the system.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Intentionally interfering with a computer system, program, or data without authorization is an offence whose penalty upon conviction could be up to ten million shillings fine or up to five years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">There are instances when the interreference causes serious Consequences such as significant financial loss, threatens national security, causes injury or death, or threatens public health/safety, the penalty increases. In this case if convicted the fine will be up to twenty million shillings or up to ten years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Again, it is important to note that it doesn’t matter if the interference is directed at a specific system, program, or data, or if its effects are temporary or permanent.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">2. Unauthorized Interception:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Intercepting data transmission to or from a computer system without authorization is an offence whose penalty upon conviction could be up to ten million shillings fine, a jail term of up to five years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Where the interception causes significant financial loss, threatens national security, causes injury or death, or threatens public health/safety, the penalty increases the fine could be up to twenty million shillings, a jail term of up to ten years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">It doesn&#8217;t matter if the interception is directed at a specific system or data, or if its effects are temporary or permanent.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">3. Illegal Devices and Access Codes:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Manufacturing, adapting, selling, or distributing devices, programs, or access codes for committing offences is illegal and would earn one if convicted a fine of up to twenty million shillings fine, a jail term of up to ten years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-contrast="auto">It is illegal to be found in possession of such items with intent to commit an offence. The penalty is a fine of up to ten million shillings fine, a jail term of up to five years imprisonment, or both. For clarity purposes possession includes having a computer system, data storage device, or control over someone else&#8217;s possession of such items.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Now the law here has made exceptions to this offence as follows: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Activities for authorized training, testing, or protection of computer systems are not offences.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto"><span data-contrast="auto">Using these items as per a judicial order or legal authority is also not an offence.</span></span>&nbsp;</li>
</ul>
<p><b><span data-contrast="auto">4. Unauthorized Disclosure of Password or Access Code</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If you knowingly and without authority disclose a password, access code, or other means of accessing a computer system you commit an offence for which upon conviction, the penalty is up to five million shillings fine, a conviction of up to three years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If the disclosure of the password or access code is done for wrongful gain, unlawful purposes, or to cause loss, the offence will attract a penalty of up to ten million shillings fine, a jail term of up to five years imprisonment, or both.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">5. Enhanced Penalty for Offences Involving Protected Computer Systems:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Committing offences 1, 2,3 and 4  above  on a protected computer system attract a penalty of up to twenty-five million shillings fine, of up to twenty years imprisonment, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-contrast="auto">Protected Computer System are systems related to security, defense, international relations, critical infrastructure, public safety, national registration, and as </span><span data-contrast="none">designated by the Cabinet Secretary.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">6. Cyber Espionage:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If you gain access or intercept data from critical databases or national infrastructure to benefit a foreign state then if convicted you face a penalty of up to twenty years imprisonment, up to ten million shillings fine, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If these offence of espionage causes physical injury the penalty shall be up to twenty years imprisonment. However, if it causes death then the penalty is life imprisonment.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">7. Unauthorized Possession or Communication:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Possessing, communicating, delivering, or making data available to benefit a foreign state attracts a penalty of up to twenty years imprisonment, up to ten million shillings fine, or both.</span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">8. Access to Exempt Information:</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Accessing or intercepting state data that is exempt from information laws to benefit a foreign state attracts a penalty of up to ten years imprisonment, up to five million shillings fine, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p>&nbsp;</p>
<p><b><span data-contrast="auto">9. Publishing False Information</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Publishing false, misleading, or fake data with intent to deceive is a crime whose penalty is up to 5 million shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">There will be a limit to your freedom of expression if false information does the following :</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Propagates war or incites violence</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Constitutes hate speech</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Advocates hatred, ethnic incitement, vilification, or discrimination</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto"><span data-contrast="auto">Negatively affects others&#8217; rights or reputations</span></span></li>
</ul>
<p><b><span data-contrast="auto">10. False Publications Leading to Panic or Chaos</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Publishing false information that causes panic, chaos, violence, or harms someone&#8217;s reputation is a crime whose penalty is a fine up to 5 million shillings or up to 10 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
11. Child Pornography</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Creating, sharing, or possessing child pornography is a crime whose penalty is a fine up to 20 million shillings or up to 25 years in prison, or both. The defenses to this offence exist and include if the publication was for a legitimate public good purpose (e.g., science, literature).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
12. Computer Forgery</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Altering data to appear authentic for legal purposes is a crime and its penalty is a fine up to 10 million shillings or up to 5 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">If the computer forgery is done for financial gain or to harm others, the penalty is a fine up to 20 million shillings or up to 10 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
13. Computer Fraud</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Using computers to fraudulently gain or cause loss is a crime and upon conviction a attracts a penalty of up to 20 million shillings or up to 10 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
14. Cyber Harassment</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Harassing someone online causing fear, harm, or offense is a crime whose penalty is a fine up to 20 million shillings or up to 10 years in prison, or both. Please notes courts have power to order stoppage of the harassment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
15. Cybersquatting</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Using someone else&#8217;s name, trademark, or domain name online without permission is a crime whose penalty is a fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
16. Identity Theft and Impersonation</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Fraudulently using someone else&#8217;s electronic signature, password, or ID is a crime that attracts a penalty of a fine up to 200,000 shillings or up to 3 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
17. Phishing</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-contrast="auto">Creating websites or sending messages to steal personal information is a crime whose penalty is a fine up to 300,000 shillings or up to 3 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">18. Unlawful Destruction of Electronic Messages</span></b></p>
<p><span data-contrast="auto">Destroying or intercepting electronic communications or money transfers is a crime attracting a penalty in form of a fine up to 200,000 shillings or up to 7 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
19. Willful Misdirection of Electronic Messages</span></b></p>
<p><span data-contrast="auto">Misleading electronic messages is a crime whose penalty may be a fine of  up to 100,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
20. Cyber Terrorism</span></b></p>
<p><span data-contrast="auto">Using computers for terrorist activities is a crime whose penalty is a fine up to 5 million shillings or up to 10 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
21. Inducement to Deliver Electronic Message</span></b></p>
<p><span data-contrast="auto">Inducing someone to deliver electronic messages meant for someone else is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
22. Intentionally Withholding Electronic Messages</span></b></p>
<p><span data-contrast="auto">Keeping electronic messages not meant for you is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
23. Fraudulent Use of Electronic Data</span></b></p>
<p><span data-contrast="auto">Using electronic data to cause loss or misrepresent facts is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
24. Publication of Intimate Images</span></b></p>
<p><span data-contrast="auto">Sharing intimate images of someone without consent is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
25. Fraudulent Use of Electronic Data</span></b></p>
<p><span data-contrast="auto">Manipulating electronic data to cause loss or gain is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
26. Issuance of False Electronic Instructions</span></b></p>
<p><span data-contrast="auto">Issuing false electronic instructions in financial transactions is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
27. Reporting of Cyber Threats</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Must report cyber threats or attacks to authorities within 24 hours.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty for non-compliance: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
28. Employee Responsibility to Relinquish Access Codes</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">An employee must give up access codes to employer’s system after leaving a job.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty for non-compliance: Fine up to 200,000 shillings or up to 2 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
29. Aiding or Abetting Cybercrime</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Helping or attempting to commit a cybercrime is a crime.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Penalty: Fine up to 7 million shillings or up to 4 years in prison, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
30. Offences by a Body Corporate</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Companies committing cybercrimes can be fined up to 50 million shillings.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Responsible officers can also be fined up to 5 million shillings or imprisoned for up to 3 years, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
31. Confiscation or Forfeiture of Assets</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Courts can confiscate assets gained from cybercrimes.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
32. Compensation Orders</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Courts can order compensation for losses caused by cybercrimes.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto"><br />
33. Additional Penalties for Other Offences</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Committing other crimes using computers attracts additional penalties.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}"> </span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Seeds and Plant Varieties Act: The Seed of Discontent Among Farmers </title>
		<link>https://acelitigator.com/seeds-and-plant-varieties-act-the-seed-of-discontent-among-farmers/</link>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Fri, 26 Jul 2024 06:27:05 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://acelitigator.com/?p=56009</guid>

					<description><![CDATA[Every cloud has a silver lining. It's heartening to see how we are awakening from our slumber and actively exercising our rights as engaged citizens by critically questioning laws and actions.]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">Every cloud has a silver lining. It&#8217;s heartening to see how we are awakening from our slumber and actively exercising our rights as engaged citizens by critically questioning laws and actions. Who could have anticipated that an Act passed in 2012 would spark public discourse and even a court petition by farmers? This situation underscores a significant challenge for lawmakers and those involved in the legislative process: the need for laws that address the unique needs of our citizens. It’s a stark reminder that public participation must be genuine and informed by our history to effectively shape our current and future legal landscape.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Many of us have either farmed or interacted with farmers at some point. Whether dealing with crops or livestock, it’s common to see farmers take pride in the quality of their seeds and practice the tradition of conserving and sharing them freely. Farmers would trade or exchange seeds informally, a practice that has long been part of agricultural life. This tradition reflects a deeply rooted way of life. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><b><span data-contrast="auto">Farmers often believe that the quality of a crop is closely linked to the quality of seeds used, and that seeds from neighboring farms can influence their own yields. This belief can be substantiated by science and especially our biology lessons on cross-pollination: if a neighboring farm&#8217;s crop is of lower quality, there’s a risk that it may cross-pollinate with your seeds, affecting their quality. </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">However, the enactment of the Seeds and Plant Varieties Act has criminalized these traditional practices and almost brought the party to a stop. This Act, which became law in 2012, regulates seed transfers through certification, testing, and the creation of a plant variety index. It also controls seed importation, guards against harmful cross-pollination, grants exclusive rights to new plant breeders, establishes a center for plant genetic resources, and creates a tribunal for appeals and related issues. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">At Section 3(c) of the Seeds and Plant Varieties Act stipulates that seed regulations may prohibit the sale of uncertified seeds, seeds containing excessive weed seeds, or seeds lacking prescribed quality factors. Sections 10(4)(e) and (f) criminalize the sale or display of seeds that do not match certification descriptions or fail to meet standards. The Act defines &#8220;sell&#8221; to include barter, exchange, and offering. Violators of these provisions face fines of up to one million shillings, imprisonment for up to two years, or both.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">In stark contrast, the Constitution of Kenya which asserts the sovereignty of the people and the supremacy of the Constitution, declares any law inconsistent with it as invalid, mandates under article 11(2)(c) the state to actively promote intellectual property rights, including those related to seeds. It further emphasizes the importance of culture, which includes the preservation of indigenous seeds and plant varieties under Article 11(3) (b. Additionally, Article 43(c) guarantees the right to adequate food of acceptable quality, implicitly acknowledging the role of seeds in food security.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">On the international front, article 19(1)(a) of the United Nations Declaration on the Rights of Peasants and Other People Working in Rural Areas (UNDROP) guarantees peasants the right to save, use, exchange, and sell their farm-saved seeds or propagating materials.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The disconnect between the Seeds and Plant Varieties Act, 2012, and the provisions of the Constitution of Kenya and the United Nations Declaration on the Rights of Peasants and Other People Working in Rural Areas (UNDROP) highlights a complex and troubling issue. The Act&#8217;s provisions, which criminalize certain traditional practices like seed sharing and trading, seem to conflict with constitutional guarantees and international rights aimed at protecting traditional farming practices and food sovereignty.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Seemingly the Seeds and Plant Varieties Act was designed to regulate seed quality, protect intellectual property rights, and ensure that seeds meet specific standards. However, it appears that the Act’s regulatory focus may have overlooked or undervalued traditional practices and the cultural significance of seed sharing among farmers.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The Act may also have been influenced by commercial interests and the need to standardize seed quality for market purposes which clearly clash with the traditional and communal practices that have long been part of farming communities.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Another concern would be if before enactment of this law, adequate consultation with farmers and other stakeholders was undertaken? It might seem that either their views were never looked at or a particular demography did not have their views taken or their traditional practices disregarded. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">In terms of the relationship of the national and international laws, there may be gaps in how the Act integrates with existing constitutional and international frameworks. The Act’s provisions may not have been harmonized with broader legal and human rights obligations, leading to inconsistencies and the failure to align with the lived realities of those it affects.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">Legislation that fails to align with the lived realities of those it affects can lead to problems of implementation as well as open a flood gate of litigations. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">It is this disconnect that got farmers petitioning the court, and challenging sections of the Seeds and Plant Varieties Act on the grounds that they criminalize seed sharing. They argue that this restriction violates their customary rights to exchange indigenous seeds and hinders their ability to access seeds, particularly for those unable to afford certified seeds. They contend that limiting access to climate-resilient seeds could jeopardize food security both for farmers and for Kenya as a whole.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The Petitioners advocate for the government to recognize and incorporate traditional seed conservation methods used by small-holder farmers. They find the Act as discriminatory and repressive, arguing that it disproportionately impacts small-scale farmers who cannot afford certification fees. This, they claim, affects their economic well-being, as the inability to access seeds impedes their capacity to produce food and generate income.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">The disconnect between the Seeds and Plant Varieties Act and constitutional and international provisions highlights the need for a more inclusive and balanced approach in agricultural legislation. It underscores the importance of aligning legal frameworks with both modern regulatory needs and traditional practices to ensure that laws support and protect the rights and practices of all stakeholders involved in agriculture. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p><span data-contrast="auto">We shall follow the progress of the Petition to its logical conclusion and keep you informed.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"></p>
<p></span></p>
<p><span data-contrast="auto"><strong>Authored by</strong><br />
Stella Orengo and Amy Ondari</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dispute Avoidance: Broadening Horizons in Legal Practice </title>
		<link>https://acelitigator.com/dispute-avoidance-broadening-horizons-in-legal-practice/</link>
					<comments>https://acelitigator.com/dispute-avoidance-broadening-horizons-in-legal-practice/#respond</comments>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Fri, 12 Jul 2024 03:55:02 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://acelitigator.com/?p=55888</guid>

					<description><![CDATA[Have you ever sat in court and wondered why parties let their dispute escalate so far? Or handled an arbitration case and couldn't understand why the issues wer not resolved earlier?]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">Have you ever sat in court and wondered why parties let their dispute escalate so far? Or handled an arbitration case and couldn&#8217;t understand why the issues wer not resolved earlier? While sitting through the proceedings, it&#8217;s often clear to you that a particular thing could have been done at an earlier stage to avert the escalation.</span> <span data-contrast="auto">Unfortunately, not everyone has the knack for proactively identifying issues and bringing them to the forefront for discussion and quick resolution to avert escalations.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In today&#8217;s world, we are all compelled to adopt a sustainability mindset when addressing issues around us. The legal profession is no exception. It must incorporate measures that ensure we keep pace with the times and leave a legacy that will benefit future legal practitioners.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Thus, this lucrative practice area gaining traction: dispute avoidance. Contrary to the belief that it reduces the bread and butter of legal practitioners, it actually broadens the scope of opportunities available for them.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Dispute avoidance is about identifying and addressing issues in a relationship—whether contractual, social, or personal—before they escalate. Potential disputes often arise at the start of a relationship or at any point during its course. One party might notice a problem but choose to overlook it, hoping it won&#8217;t become serious enough to address.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Take the onset of courtship leading to marriage, in which one party might foresee the need for a pre-nuptial agreement to avoid potential property disputes if the marriage dissolves. Or consider a construction project: a party might want the contractor to secure insurance for cost overruns or include provisions in the contract for handling such issues. During negotiations which most of the time begin on the basis of trust, these concerns might be overlooked. Yet, when triggered, these issues can escalate into disputes requiring resolution.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">It&#8217;s not enough to hope that an issue will resolve itself. It&#8217;s crucial for parties to address concerns early, as the other party might not even be seeing a potential problem in their dealings. And if both parties can&#8217;t see the potential issues, that&#8217;s where experts in dispute avoidance come in.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Dispute avoidance involves identifying and resolving potential conflicts before they become full-blown disputes. It employs proactive measures to manage and address issues early, preventing them from developing into more serious and costly conflicts that might require legal or arbitration proceedings.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Some of the benefits of Dispute Avoidance are as follows:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Cost Savings: Resolving issues early can save substantial amounts of money that would otherwise be spent on lengthy legal battles, court fees, and arbitration costs.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Time Efficiency: Addressing potential disputes promptly avoids the time-consuming nature of formal legal proceedings, allowing parties to focus on their core activities.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Preservation of Relationships: Proactive conflict resolution helps maintain positive relationships between parties, which is especially important in business and personal contexts where ongoing interaction is necessary.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Reduced Stress: Avoiding drawn-out disputes reduces stress for all parties involved, leading to a more positive working environment and better mental health.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Reputational Protection: Managing and resolving conflicts early prevents public disputes that could harm the reputations of the parties involved.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="auto">Greater Control: Parties have more control over the outcome when they resolve disputes through negotiation and mediation rather than leaving decisions in the hands of a judge or arbitrator.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">Customized Solutions: Dispute avoidance allows for creative and flexible solutions tailored to the specific needs and interests of the parties, which is often not possible in formal legal settings.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1"><span data-contrast="auto">Prevention of Escalation: By addressing potential issues before they escalate, dispute avoidance prevents minor conflicts from turning into major legal battles.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">Enhanced Communication: Encouraging open and transparent communication fosters a culture of trust and collaboration, which can lead to more effective teamwork and cooperation.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1"><span data-contrast="auto">Risk Management: Early identification and resolution of potential disputes help manage and mitigate risks, leading to more stable and predictable outcomes.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1"><span data-contrast="auto">Improved Productivity: With fewer conflicts to manage, parties can focus on their primary objectives and activities, leading to increased productivity and efficiency.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1"><span data-contrast="auto">Legal and Ethical Compliance: Proactive dispute management ensures that parties remain compliant with legal and ethical standards, reducing the risk of regulatory issues and legal penalties.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="13" data-aria-level="1"><span data-contrast="auto">Sustainability: Dispute avoidance promotes long-term sustainability of business relationships and partnerships by fostering a cooperative and conflict-free environment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-contrast="auto">Incorporating dispute avoidance into legal practice not only benefits clients but also enhances the reputation and effectiveness of legal professionals by demonstrating their commitment to proactive and constructive conflict resolution.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://acelitigator.com/dispute-avoidance-broadening-horizons-in-legal-practice/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Shared Responsibility: Disaster Management Between Kenya&#8217;s National and County Governments</title>
		<link>https://acelitigator.com/shared-responsibility-disaster-management-between-kenyas-national-and-county-governments/</link>
					<comments>https://acelitigator.com/shared-responsibility-disaster-management-between-kenyas-national-and-county-governments/#respond</comments>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Fri, 26 Apr 2024 06:34:32 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://test.njagaadvocates.com/?p=13827</guid>

					<description><![CDATA[The ongoing rains and resulting floods persist, causing loss and widespread panic fueled by uncertainty about when and where the storm waters will strike.]]></description>
										<content:encoded><![CDATA[<p style="margin-bottom: 0.5rem;">The ongoing rains and resulting floods persist, causing loss and widespread panic fueled by uncertainty about when and where the storm waters will strike. Concerns about building safety and the impending school reopening heighten anxiety. While county governments undertake some rescue efforts, they are widely seen as inadequate. Criticism mounts over the failure to take proactive measures despite early rain warnings. The lack of substantive communication from government has left many Kenyans wondering about the roles and responsibilities of both levels of government in disaster management.</p>
<p style="margin-bottom: 0.5rem;">Disaster management in Kenya is a shared responsibility between the National government and the devolved county governments. According to the 2010 Constitution of Kenya, disaster management functions and responsibilities constitute concurrent functions under Article 186(2) meaning both levels of government have defined roles and responsibilities in this area.</p>
<p style="margin-bottom: 0.5rem;">The Fourth Schedule of the Constitution delineates the division of responsibilities between the national and county governments. Part 1, Section 24, designates disaster management functions to the national government, while Part 2, Section 12, allocates related duties to county governments. Furthermore, Legal Notice No. 16 of February 1, 2013, transferred firefighting services and disaster management functions to county governments.</p>
<p style="margin-bottom: 0.5rem;">The national government oversees overarching disaster management policies, provides support for large-scale disasters, and co-ordinates national-level responses. County governments, on the other hand, are responsible for implementing disaster management activities at the local level, including preparedness, response, and recovery efforts within their respective jurisdictions.</p>
<p style="margin-bottom: 0.5rem;">As a concurrent function, Kenya&#8217;s disaster response system operates on the Principle of Subsidiarity. County governments take the lead in managing disasters at levels 1 or 2, while national involvement increases for levels 3 or 4. County Governors oversee local responses, while Presidential engagement is reserved for national emergencies.</p>
<p>Disasters are categorized into different levels, each with its own response framework. At Level 1, disasters are managed locally by the County Governor, with routine services. Level 2 situations may strain local resources but remain manageable within the county&#8217;s capacity, still overseen by the County Governor. However, Level 3 disasters require the mobilization of national resources, prompting Presidential involvement. In cases of Level 4 disasters that overwhelm national capacity, Presidential engagement is necessary for regional or international assistance.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://acelitigator.com/shared-responsibility-disaster-management-between-kenyas-national-and-county-governments/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Guarding Justice:  Hire Not Persons masquerading as Lawyers</title>
		<link>https://acelitigator.com/guarding-justice-hire-not-persons-masquerading-as-lawyers/</link>
					<comments>https://acelitigator.com/guarding-justice-hire-not-persons-masquerading-as-lawyers/#respond</comments>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Wed, 17 Apr 2024 06:27:26 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://test.njagaadvocates.com/?p=13817</guid>

					<description><![CDATA[Ever considered why lawyers frown at individuals posing as legal professionals?]]></description>
										<content:encoded><![CDATA[<p>Ever considered why lawyers frown at individuals posing as legal professionals? While encroachment on their livelihood is a factor, let&#8217;s forget the lawyers for a moment and look at it from the perspective of consumers of legal services.</p>
<p style="margin-bottom: 0.5rem;">Did you know that when you enlist a qualified lawyer, there is recourse for you if things go awry in your lawyer-client relationship?</p>
<p style="margin-bottom: 0.5rem;">Let’s pause a little here. </p>
<p style="margin-bottom: 0.5rem;">In the client-advocate relationship, while we hope for the best, unforeseen circumstances can arise. Implementing proactive safeguards is essential to address potential complications effectively. Comprehensive risk management strategies benefit both clients and advocates, fostering trust, reliability, and accountability within the legal profession.</p>
<p style="margin-bottom: 0.5rem;">Now that we are aligned, let&#8217;s explore the multitude of compelling reasons to make you steer clear of hiring unqualified individuals as lawyers in Kenya: </p>
<p style="margin-bottom: 0.5rem;">In discussions regarding unqualified individuals posing as lawyers, you must have come across the argument that non-lawyers at times excel in legal matters. These claims unfortunately lack solid data. While unqualified individuals may possess basic legal understanding, they often lack the essential education, training, and expertise required to handle legal matters proficiently. This deficiency can lead to mistakes, omissions, or insufficient representation, putting the outcome of your case at risk.</p>
<p style="margin-bottom: 0.5rem;">Unqualified persons are not bound by any ethical codes, they are not officer of the court and thus may not adhere to the ethical standards and professional conduct expected of licensed lawyers. They may engage in unethical practices, such as providing misleading advice, mishandling client funds, or breaching client confidentiality. An unresolved question in this discussion is what recourse is available if an unqualified individual discloses information provided by seekers of legal services.</p>
<p style="margin-bottom: 0.5rem;">Entrusting your legal affairs to an unqualified lawyer exposes you to various legal risks. They may give incorrect legal advice, draft flawed legal documents, or fail to protect your interests adequately, leading to potential legal disputes or financial losses. Consider a scenario where a document is drafted without a proper dispute resolution clause, potentially leading to inappropriate, lengthy, and costly dispute resolution processes.</p>
<p style="margin-bottom: 0.5rem;">In Kenya, lawyers are disciplined through regulatory bodies, professional associations, and legal procedures to uphold ethical standards and protect the public interest, such as the Advocates Complaints Commission, the Disciplinary Tribunal, and the courts. However, unqualified individuals lack similar oversight, except through court proceedings, potentially leaving dissatisfied clients with limited recourse.</p>
<p style="margin-bottom: 0.5rem;">But for qualified lawyers it doesn&#8217;t end at disbarment of suspension. Lawyers are mandated to have professional indemnity insurance, which steps in to compensate an aggrieved client. Unlike licensed lawyers, they may not be covered by professional indemnity insurance, making it challenging to recover damages for any harm caused.</p>
<p style="margin-bottom: 0.5rem;">Engaging unqualified lawyers undermines the integrity and credibility of the legal profession and the justice system as a whole. It contributes to a lack of trust in legal services and may erode public confidence in the administration of justice.</p>
<p style="margin-bottom: 0.5rem;">In some cases, seeking legal assistance from an unqualified individual may constitute unauthorized practice of law, which is illegal and punishable by law. Both clients and unqualified practitioners could </p>
<p style="margin-bottom: 1rem;">face legal consequences for participating in such activities.</p>
<p>Overall, engaging unqualified lawyers poses significant risks and is not advisable. It is essential to prioritize the expertise, credentials, and professionalism of licensed lawyers to ensure the best possible legal representation and protect your interests effectively.</p>
<p style="font-style: italic;">Written by <strong>Stella Amisi Orengo</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://acelitigator.com/guarding-justice-hire-not-persons-masquerading-as-lawyers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hatua za kushtaki mtu kwa uhalifu</title>
		<link>https://acelitigator.com/hatua-za-kushtaki-mtu-kwa-uhalifu/</link>
					<comments>https://acelitigator.com/hatua-za-kushtaki-mtu-kwa-uhalifu/#respond</comments>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Mon, 25 Mar 2024 11:58:06 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://test.njagaadvocates.com/?p=13813</guid>

					<description><![CDATA[Mjadala unaondelea Kenya kuhusu kesi za uhalifu za watu maarufu umefunua kiasi kidogo tunachojua kuhusu jinsi kesi za uhalifu zinavyosikizwa.]]></description>
										<content:encoded><![CDATA[<p style="margin-bottom:0.5rem;">Mjadala unaondelea Kenya kuhusu kesi za uhalifu za watu maarufu umefunua kiasi kidogo tunachojua kuhusu jinsi kesi za uhalifu zinavyosikizwa. Hakuna wakati bora kama sasa kwa umma kujifunza mchakato wa kushtaki mtu kwa uhalifu.</p>
<p style="margin-bottom: 0.5rem">Maarifa haya ni muhimu kwani yanaweza kusaidia walalamikaji, washukiwa, na wale waliohusika nao kuepuka vitendo vinavyoweza kusababisha kushindwa kwa haki.</p>
<p style="margin-bottom: 0.5rem">Hatua za kushtaki mtu kwa uhalifu kawaida hufuata hatua muhimu hizi nchini Kenya: </p>
<p><strong>kuwasilisha malalamishi</strong></p>
<p style="margin-bottom: 1rem;">Hatua hii ya awali hufanyika katika kituo cha polisi, ambapo mlalamikaji anawasilisha malalamiko, yanayosajiliwa kwa usahihi katika kitabu cha tukio. Mlalamikaji kisha hupokea nambari ya kumbukumbu ambayo ni muhimu kwa ajili ya ufuatiliaji wakati wa uchunguzi.</p>
<p><strong>Uchunguzi:</strong></p>
<p style="margin-bottom: 0.5rem">Polisi au mamlaka husika ya utekelezaji wa sheria inafanya uchunguzi wa uhalifu uliodaiwa. Hii inajumuisha kukusanya ushahidi, kufanya mahojiano na mashahidi, na kukusanya habari muhimu. Kwa kuongezea, taarifa kutoka kwa mlalamikaji na mashahidi wao husika zinaweza kudhibitishwa, hatua ambayo itasababisha  kuandikwa kwa mashtaka.</p>
<p><strong>Kukamatwa:</strong></p>
<p style="margin-bottom: 0.5rem">Kama uchunguzi unatoa ushahidi wa kutosha, mtuhumiwa anaweza kukamatwa. Kukamatwa lazima kufanyike kwa kufuata taratibu za kisheria, na haki za mtuhumiwa zinapaswa kuheshimiwa.</p>
<p><strong>Dhamana:</strong


<p style="margin-bottom: 0.5rem">Baada ya kukamatwa, mtuhumiwa anaweza kuachiliwa kwa dhamana kutegemea ukali wa kosa. Kwa makosa madogo, mtuhumiwa anaweza kutolewa tiketi na maelekezo ya kufika mahakamani.</p>
<p><strong>Kushtakiwa:</strong></p>
<p style="margin-bottom: 0.5rem">Baada ya kukamatwa, mtuhumiwa anashtakiwa rasmi na kosa lililodaiwa. Hii inajumuisha kurekodi maelezo ya kosa, sheria iliyokiukwa, na pande zinazohusika kwenye karatasi ya mashtaka. Kesi kisha hupelekwa kwa mwendesha mashtaka wa serikali kwa tathmini ya ushahidi wa kutosha.</p>
<p><strong>Kufikishwa Mahakamani na Kutolewa Kauli ya Mashtaka</strong></p>
<p style="margin-bottom: 0.5rem">Washukiwa wanaletwa mbele ya Mahakama na kusomewa mashtaka. Wanatakiwa kujibu mashtaka hayo kwa kukiri au kuto kukiri. Kukiri kunapelekea kuhukumiwa mara moja ikiwa kesi ni kali au  kuachiwa huru kwa makosa yasiyo  na uzito. Kutokukiri kutaendeleza kesi hiyo kusikizwa mahakamani.</p>
<p><strong>Kusikilizwa kwa Dhamana</strong></p>
<p style="margin-bottom: 0.5rem">Baada ya kusomewa mashtaka, washukiwa wanaweza kuombewa dhamana ili waachiliwe wakiwa nje ya jela hadi kesi yao itakaposikilizwa. Mambo kama hatari ya kukimbia na ukali wa kosa huzingatiwa katika kusikiliza hii. Ushahidi kutoka pande zote mbili, upande wa mashtaka na utetezi, hutolewa kwa kuzingatiwa na mahakama. Kukubaliwa kwa dhamana kunahusisha malipo ya fedha hadi kufika kwa kesi za baadaye; kukataliwa kunapelekea kuzuiliwa, na kesi kutajwa kila baada ya wiki mbili.</p>
<p><strong>Kesi Mahakamani:</strong></p>
<p style="margin-bottom: 0.5rem">Kesi hufunguliwa, ambapo upande wa mashtaka na utetezi huleta ushahidi wao mbele ya afisa wa mahakama. Upande wa mashtaka huanza na taarifa za kuanza kesi, kufuatiwa na kutoa sheria, ushahidi, na mashahidi. Upande wa utetezi huchukua nafasi yake kwa kutoa ushahidi wao, ushahidi wa sheria husika, mashahidi, na ushahidi mwingine. Kila upande una nafasi ya kuhoji mashahidi wa upande mwingine. Baada ya hapo, pande zote mbili hutoa kauli za mwisho kabla ya jaji kufanya uamuzi.</p>
<p><strong>Hukumu:</strong></p>
<p style="margin-bottom: 0.5rem">Baada ya kusikiliza ushahidi wote na hoja, jaji hutangaza uamuzi wa hatia au kutokuwa na hatia. Ikiwa mshitakiwa amepatikana na hatia, mahakama huendelea na kutoa adhabu.</p>
<p><strong>Kutoa Adhabu:</strong></p>
<p style="margin-bottom: 0.5rem">Baada ya kuhukumiwa, jaji anatoa adhabu kwa kuzingatia mwongozo maalum wa adhabu kwa kosa husika.</p>
<p><strong>Mazingira ya Kupunguza Adhabu:</strong></p>
<p style="margin-bottom: 0.5rem">Upande wa utetezi unaweza kuwasilisha mazingira ya kupunguza adhabu, kama vile kuwa ni kosa la kwanza, umri mkubwa, au kuwa  mlezi wa familia. Mara jaji anapotoa adhabu, kesi hufungwa. Kila upande una haki ya kukata rufaa kuzingatia sheria zilizoko.</p>
<p><strong>Rufaa </strong></p>
<p >Wote upande wa mashtaka na utetezi wana haki ya kukata rufaa dhidi ya uamuzi au adhabu ikiwa wanaamini kuna makosa katika mchakato wa kesi au ikiwa ushahidi mpya unaibuka.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://acelitigator.com/hatua-za-kushtaki-mtu-kwa-uhalifu/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The stages of criminal prosecution</title>
		<link>https://acelitigator.com/the-stages-of-criminal-prosecution/</link>
					<comments>https://acelitigator.com/the-stages-of-criminal-prosecution/#respond</comments>
		
		<dc:creator><![CDATA[clinton]]></dc:creator>
		<pubDate>Mon, 25 Mar 2024 11:14:37 +0000</pubDate>
				<category><![CDATA[Legal News & Updates]]></category>
		<guid isPermaLink="false">https://test.njagaadvocates.com/?p=13803</guid>

					<description><![CDATA[The ongoing debate in Kenya surrounding high-profile criminal cases has highlighted our limited understanding of how criminal prosecutions are conducted.]]></description>
										<content:encoded><![CDATA[<p style="margin-bottom: 1rem;">The ongoing debate in Kenya surrounding high-profile criminal cases has highlighted our limited understanding of how criminal prosecutions are conducted. There&#8217;s no better opportunity than now for the general public to familiarize themselves with the process of criminal prosecution. This knowledge is crucial as it may assist complainants, suspects, and those associated with them in avoiding actions that could potentially lead to miscarriages of justice. </p>
<p style="margin-bottom: 1rem;">In Kenya, the stages of criminal prosecution typically follow these key steps: </p>
<p><strong>Making or lodging of a complaint </strong></p>
<p style="margin-bottom: 0.5rem;">This initial step occurs at a police station, where the complainant files a complaint, duly recorded in an occurrence book. The complainant will then receive a reference number which is useful for tracking purposes during the investigation.</p>
<p><strong>Investigation: </strong></p>
<p style="margin-bottom: 0.5rem;">The police or relevant law enforcement agency conducts an investigation into the alleged crime. This involves gathering evidence, interviewing witnesses, and collecting relevant information. Additionally, statements from the complainant and their relevant witnesses may be documented, potentially leading to the drafting of a charge.</p>
<p><strong>Arrest:</strong></p>
<p style="margin-bottom: 0.5rem;">If the investigation reveals sufficient evidence, the suspect may be arrested. The arrest must be conducted in accordance with the legal procedures, and the suspect&#8217;s rights must be respected.</p>
<p style="margin-bottom: 0.5rem;">Detention lasts up to 24 hours before the individual is brought before court. If arrested on a weekend or public holiday, appearance in court must occur by the following court day.</p>
<p><strong>Police bond:</strong></p>
<p style="margin-bottom: 0.5rem;">After arrest, the suspect may be released on police bond pending arraignment (with the exclusion of serious crimes like murder and robbery with violenc), upon execution of a bond with or without sureties for their appearance. Minor offenses may result in the issuance of a citation with instructions for a court appearance.</p>
<p><strong>Charging:</strong></p>
<p style="margin-bottom: 0.5rem;">After the arrest, the suspect is formally charged with the alleged crime. This entails having the particulars of the offense, the laws contravened and the parties involved being recorded on a charge sheet. The case is then handed over to state prosecutors for assessment of evidential sufficiency. This is typically done by presenting the evidence to the prosecution authority;the Office of the Director of Public Prosecutions (ODPP) in Kenya.</p>
<p><strong>Arraignment and Plea taking</strong></p>
<p style="margin-bottom: 0.5rem;">Initial appearances for all offenses occur in Court. The suspect is informed of charges and prompted to enter a plea of guilty or not guilty. Guilty pleas lead to immediate conviction and sentencing by a judicial officer while a plea of not guilty progresses the matter to trial.</p>
<p><strong>Bail Hearing</strong></p>
<p style="margin-bottom: 0.5rem;">After plea taking, the suspect may have a bail hearing to determine if they will be released from custody pending trial. Factors such as flight risk and the seriousness of the offense are considered in this hearing. Evidence from both prosecution and defense is presented for the court&#8217;s consideration. Granted bail entails cash payment pending subsequent court appearances; denial results in remand, with case mentions every two weeks, excluding offenses punishable by fine or short imprisonment.</p>
<p><strong>Trial</strong></p>
<p style="margin-bottom: 0.5rem;">There may be pre-trial hearings to address procedural matters, such as evidence disclosure and legal arguments. These hearings aim to streamline the trial process. Trials entail prosecution and defense presenting their cases before a judicial officer.</p>
<p><strong>Prosecution case:</strong></p>
<p style="margin-bottom: 0.5rem;">The prosecution starts with opening statements, followed by presenting legislation, evidence, and witnesses.</p>
<p><strong>Defense Case:</strong> </p>
<p>The defense then presents its case, including relevant law, witnesses, and evidence, with opportunities for cross-examination. Both parties offer closing statements before the judicial officer deliberates and renders judgment with reasons.</p>
<p><strong>Verdict:</strong></p>
<p style="margin-bottom: 0.5rem;">After hearing all the evidence and arguments, the judicial officer delivers a verdict of guilty or not guilty. If the verdict is guilty, the court proceeds to sentencing. A guilty verdict leads to conviction and sentencing.</p>
<p><strong>Sentencing</strong></p>
<p style="margin-bottom: 0.5rem;">Following conviction, sentencing is determined by the judicial officer, referencing specific offense sentencing guidelines.</p>
<p><strong> Mitigation</strong></p>
<p style="margin-bottom: 0.5rem;">The defense may present mitigating circumstances to potentially reduce sentencing, such as first-time offenses, advanced age, or familial breadwinner status. Once the judge pronounces the sentence, the case concludes. Either party can appeal, limited to points of law rather than fac</p>
<p><strong>Appeals and Reviews</strong></p>
<p>Both the prosecution and the defense have the right to appeal the verdict or sentence if they believe there were errors in the trial process or if new evidence comes to light.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://acelitigator.com/the-stages-of-criminal-prosecution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
