Research Outline
Research Outline
Research Outline
Contents
RESEARCH OUTLINE...............................................................................................................................1
FACTS.................................................................................................................................................1
ISSUE..................................................................................................................................................2
RULE/RATIO.......................................................................................................................................2
APPLICATION.....................................................................................................................................3
PRIVACY AND RIGHTS OF A DATA SUBJECT...................................................................................3
CYBER CRIMES...............................................................................................................................5
DATA PROTECTION........................................................................................................................5
CONCLUSION.....................................................................................................................................5
COPY AND PASTED LAW SECTIONS N ARTICLES.....................................................................................6
Data Protection Act...............................................................................................................................6
72. Offences of unlawful disclosure of personal data..................................................................6
73. General penalty.....................................................................................................................7
Computer Misuse and Cybercrimes Act................................................................................................8
14. Unauthorised access....................................................................................................................8
15. Access with intent to commit further offence.............................................................................9
16. Unauthorised interference..........................................................................................................9
17. Unauthorised interception........................................................................................................10
22. False publications......................................................................................................................10
27. Cyber harassment......................................................................................................................11
Defamation Act, 1970..........................................................................................................................11
OUTLINES AND WRITING PLANS:.........................................................................................................12
IRAC (ISSUE, RULE, APPLICATION, AND CONCLUSION):.......................................................................12
CONTENTS OF A LEGAL OPINION:........................................................................................................14
ANDREA VS DCI....................................................................................................................................14
ANDREA VS TIMONA...........................................................................................................................14
ANDREA VS UNIVERSITY......................................................................................................................15
1
2
QUESTION 1 (8 MARKS)
Andrea Wakesho, a University student at Wasomi University in Embu stumbled upon some
confidential documents on her university's server. Apparently, the server had not been
secured by the University’s ICT Department. Andrea downloaded the documents onto a flash
drive with the intention of studying them further. The University’s ICT Department had no
idea that Andrea downloaded the documents. However, to date, Andrea is yet to study the
documents.
Unknown to Andrea, her roommate Timona Wandia had been secretly observing her actions
and decided to record a video of her accessing the confidential documents. Timona then
shared the video on several social media platforms accusing Andrea of hacking into the
university's server and stealing sensitive information. Timona on her social media posts
referred to Andrea as ‘an incorrigible hacker and thief’.
Due to Timona’s social media posts, Andrea has been summoned by the Directorate of
Criminal Investigations to shed light on the allegations levelled against her. The University
Senate has also sent a letter to Andrea to show cause as to why she should not face
disciplinary action.
With the above information, draft the following:
a.) A research outline for the matter, (Maximum two (2) A4 pages) and
b.) A legal opinion to Andrea explaining her legal position and options available to her.
(Maximum four (4) A4 pages).
RESEARCH OUTLINE
FACTS
Andrea Wakesho
A University student at Wasomi University in Embu
She downloads confidential unsecured documents from her university's server with the
intention of studying them further.
The University’s ICT Department had no idea that Andrea downloaded the documents.
However, to date, Andrea is yet to study the documents.
As a aresult of Timona’s social media posts Andrea has been summoned by the
Directorate of Criminal Investigations to shed light on the allegations levelled against her
and the University Senate has also sent a letter to Andrea to show cause as to why she
should not face disciplinary action.
2
3
Timona Wandia
Andreas roommate
Timona Wandia had been secretly observing her actions and
She secretely records a video of her accessing the confidential documents.
Shares the video on social media platforms
In the video and on social media she accuses Andrea of being an incorrigible hacker and
thief
ISSUE
What are the legal issues
1. Are Andreas actions a breach of the Computer Misuse and Cybercrimes Act offenses?
2. Is Andrea guilty of Data Protection Act offenses?
3. Is Andrea in breach of the Universities rules and regulations?
4. Is Timona guilty of defamation?
5. Is Timona guilty of Data Protection Act offenses?
6. Is Timona gulty of violating Andreas right to privacy?
7. Is Timona guilty of breaching Anreas right to digniy?
8. Is Timona in breach of the rights of a data subject?
9. Is Timona guilty of cyber harassment?
RULE/RATIO
relevant legal rule(s) that apply to the issues
1. Computer Misuse and Cybercrimes Act sections 14, 16, 17, 27?
2. Data Protection Act sections 26, 72 and 73?
3. Defamation as per common law and Defamation Act, 1970
4. 2010 Constitution, article 28 and 31
5. Kenya is a signatory to the Universal Declaration of Human Rights (‘UDHR’) and has
ratified the International Covenant on Civil and Political Rights (‘ICCPR’). Article 17 of
the ICCPR, which reinforces Article 12 of the UDHR, provides that “no one shall be
subjected to arbitrary or unlawful interference with his privacy, family, home or
correspondence, nor to unlawful attacks on his honour and reputation”.
APPLICATION
3
4
Jessicar Clarise Wanjiru –vs- Davinci Aesthetics & Reconstruction Centre & 2
Others [2017] eKLR where the privacy was defined as follows:“The right of the individual
to be protected against intrusion into his personal life or affairs, or those of his family, by
direct physical means or by publication of information.”[5]In the above sense any intrusion of
personal life by whatever means or form such as photography, written articles or caricatures
may be ground for an action for breach of privacy.”
T.O.S v Maseno University & 3 Others [2016] eKLR where Chemitei J held that;“From the
above reasoning and expositions of the law it is clear that publication or use of the images of
an individual without his consent violates that person’s right to privacy. I say so because a
person's life is a restricted realm in which only that individual has the power of determining
whether another may enter, and if so, when and for how long and under what conditions.”
Coalition for Reform and Democracy (CORD) & 2 others –vs- Republic of Kenya & 10
others [2015] eKLR where it was held that;“Protecting privacy is necessary if an individual is
to lead an autonomous, independent life, enjoy mental happiness, develop a variety of diverse
4
5
interpersonal relationships, formulate unique ideas, opinions, beliefs and ways of living and
participate in a democratic, pluralistic society. The importance of privacy to the individual
and society certainly justifies the conclusion that it is a fundamental social value, and should
be vigorously protected in law. Each intrusion upon private life is demeaning not only to the
dignity and spirit of the individual, but also to the integrity of the society of which the
individual is part.”
M W K v another v Attorney General & 3 others [2017] eKLR, the court observed as
follows; “Dignity is a founding value of our Constitution. It informs most if not all of the
rights in the Bill of Rights and for that reason is of central significance in the limitations
analysis.
105.The value of dignity in our Constitutional framework cannot therefore be doubted. The
Constitution asserts dignity to contradict our past in which human dignity was routinely and
cruelly denied. It asserts it too to inform the future, to invest in our democracy respect for the
intrinsic worth of all human beings.
106.Human dignity therefore informs constitutional adjudication and interpretation at a range
of levels. It is a value that informs the interpretation of many, possibly all, other rights. This
Court acknowledges the importance of the constitutional value of dignity in interpreting
rights such as the right to equality, the right not to be punished in a cruel, inhuman or
degrading way, and the right to life. Human dignity is also a constitutional value that is of
central significance in the limitations analysis. Dignity is not only a value fundamental to our
Constitution, it is a justiciable and enforceable right that must be respected and protected.”
J W I & another v Standard Group Limited & another [2015] eKLR which the Petitioner
has referred and stated that;“In determining the scope of the right to privacy, the Consultative
Assembly of the Council of Europe has defined Article 8(2) of the European Convention on
Human Rights, which provides for the right to privacy of an individual’s private and family
life, his home and correspondence, as follows;“The right to privacy consists essentially in the
right to live one’s own life with a minimum interference. It concerns private family and home
life, physical and moral integrity, honour and reputation, avoidance of being placed in a false
light, non-revelation of irrelevant and embarrassing facts, unauthorized publication of private
photographs, protection from disclosure of information given or received by the individual
confidentially”.
5
6
CYBER CRIMES
DATA PROTECTION
CONCLUSION
6
7
(a) obtains access to personal data, or obtains any information constituting such
data, without prior authority of the data controller or data processor by whom the data
is kept; or
(b) discloses personal data to third party, commit an offence.
(4) Subsection (3) shall not apply to a person who is an employee or agent of a data
controller or data processor acting within the scope of such mandate.
(5) A person who offers to sell personal data where such personal data has been obtained
in breach of subsection (1) commits an offence.
(6) For the purposes of subsection (5), an advertisement indicating that personal data is or
may be for sale constitutes an offer to sell the personal data.
"access" means gaining entry into or intent to gain entry by a person to a program or data
stored in a computer system and the person either—
(a) alters, modifies or erases a program or data or any aspect related to the program or data in
the computer system;
(b) copies, transfers or moves a program or data to—
(i) any computer system, device or storage medium other than that in which it is
stored; or
(ii) to a different location in the same computer system, device or storage medium in
which it is stored;
(c) causes it to be output from the computer in which it is held, whether by having it
displayed or in any other manner; or
(d) uses it by causing the computer to execute a program or is itself a function of the
program;
"interception" means the monitoring, modifying, viewing or recording of non-public
transmissions of data to or from a computer system over a telecommunications system, and
includes, in relation to a function of a computer system, listening to or recording a function of
a computer system or acquiring the substance, its meaning or purport of such function;
"interference" means any impairment to the confidentiality, integrity or availability of a
computer system, or any program or data on a computer system, or any act in relation to the
computer system which impairs the operation of the computer system, program or data;
9
10
(3) For the purposes of this section, it is immaterial that the unauthorised access is not
directed at—
(a) any particular program or data;
(b) a program or data of any kind; or
(c) a program or data held in any particular computer system.
12
13
a) Issue: First, identify the legal issue or question you will be analyzing. Your statement of
the issue should track the question asked at the end of the assignment, otherwise known as
“the call of the question.” It orients the reader to the precise point you are about to discuss
and is typically one sentence. State the issue in its own separate paragraph and particularly in
a single sentence. Include brief important facts giving context to the general issue as it
pertains to your case. The statement of the issue should be succinct. For instance, Whether X
broke into and entered the house at night given that he was arrested in the house just as the
sun was setting.
b) Rule: Next, identify and discuss relevant legal rule(s) that apply to the issue. The rules
may be drawn from Statutes, authorities, etc. This informs the reader of the law pertinent to
the client’s situation. Start with general rules, which are also called umbrella rules. Then, if
applicable, move on to the more specific rules that address the issue at hand within the
general rule. The specific rules are called sub-rules. For e.g., a general rule might read:
“Night” is defined as the time between 30 minutes after sunset and 30 minutes before sunrise.
Paraphrasing the rules helps you understand them and how best they serve your analysis.
Discuss all applicable rules in the Rule section. Don’t add them later in the Application or
Conclusion Sections.
c) Application: This is the most important and usually the longest section of IRAC. Here,
apply the rules to the facts you have been given in order to show the link between the law and
the facts. In doing so, one needs to remember:
being objective: One should analyze the case from both sides, the plaintiff’s and the
defendant’s. Consider all the facts given and the logical inferences that can be drawn from
them. Don’t make up facts or assume facts that have not been given. Demand for more facts
if you need them instead of assuming.
don’t be too conclusory: Do not state conclusions without telling the reader how you got
there.
ii. Writing Techniques: Mirroring: Organize with paragraphs that follow the rule’s order.
Analyze each element of the rule separately, in the order stated in the Rule section you
have written.
If an argument is extensive and fairly evenly weighted for each side, use one paragraph to
discuss each side. In other words, the discussion of each element of the rule will contain two
paragraphs, one devoted to the plaintiff’s argument and one devoted to the defendant’s.
For each element, present the argument for the weaker side first. End with the discussion
supporting the stronger side, the side you think will prevail on that particular element. Then,
at the end of the discussion on that element, write a sub-conclusion on behalf of the winning
side.
Keep paragraphs moderately short: Use topic (thesis) sentences to begin each paragraph in
the Application section. Topic sentences introduce the subject matter of a paragraph.
When doing predictive writing, use hedge words in your topic sentences and conclusions
(unless the outcome is relatively certain).
Use transitions or signposts whenever you start a new point. They guide the reader through
the analytical structure of your writing and connect succeeding ideas and theses together or
show the relationship between them.
d) Conclusion: In a final paragraph, briefly state the conclusion you have reached as to
whether the elements of the rule have been met. The conclusion should follow from the sub-
conclusions you have reached on each respective element. Never add new information in the
conclusion. It states whether the required element of a complex or simple rule are met or not.
Techniques of outline and writing plan: The following are the techniques which might be
adopted:
a) Read through all your research.
b) Don’t overlook obvious ways of organizing.
c) Talk to a colleague.
d) Consider the reader and purpose: The writer must provide the reader with whatever
information the reader needs to understand what is being written and why.
14
15
ANDREA VS DCI
Possible criminal offences
Computer Misuse and Cybercrimes Act
14, 16, 17
Data Protection Act
72, 73
ANDREA VS TIMONA
Defamation -
Data Protection Act 72, 73
What are the possible consequences of being found liable for civil defamation? Where the
civil claim is successfully established against you, the civil reliefs that can be entered against
you include damages, injunctions, apology, or orders of retraction of defamatory
statement(s). a. Injunction: When publication of a defamatory statement is threatened, the
person about to be defamed is not obliged to wait for the act to occur. The person/entity can
apply to a Court for an injunction to prevent the publication. b. Damages: If the defamatory
statement has already been published and someone/an entity is successful in proving a
15
16
ANDREA VS UNIVERSITY
BIBLIOGRAPHY
16