Zimababwe Cyber Law Threatens Freedom of Expression

#ThisFlag

President Robert Mugabe’s government is under unprecedented pressure to deliver on its 2013 election promises, with protests by disgruntled Zimbabweans becoming a daily phenomenon.

The anger is more pronounced on social media platforms such as Facebook and Twitter, where fed-up citizens vent their anger over runaway corruption, unemployment and police brutality.

Pastor Evan Mawarire’s #ThisFlag movement successfully tapped into this anger before he was hounded out of the country through the familiar treason trump card used against Mugabe’s critics such as Dumiso Dabengwa, Ndabaningi Sithole, Morgan Tsvangirai, Welshman Ncube and Renson Gasela, among many others in the past.

Instead of listening to the issues raised by Mawarire and many other Zimbabweans, Mugabe and his ruling Zanu PF reacted with venom, labelling all critics enemies of the country.

In typical Zanu PF fashion, the critics were labelled cyber terrorists to deligitimise their cause and justify a government crackdown that would only help to concretise Zimbabwe’s image as a dictatorship.

Zimbabwe Defence Forces commander Constantino Chiwenga waded into the debate and claimed that Zimbabweans were waging cyber warfare against the government.

Chiwenga went on to threaten those who use social media to exercise their freedom of expression with unspecified action.

Information minister Christopher Mushohwe upped the ante, saying the government would not fold its hands while people violated the Constitution through social media.

State media dutifully amplified the government and the military voices, going to the extent of naming some Zimbabweans in the diaspora as cyber terrorists in typical lynch mob-style.

The government says it is now crafting a law to regulate social media in the wake of protests that have been mainly organised through the platforms.

The Computer and Cyber Crime Bill if passed into law would enable the government to demand the source of information of any content deemed to be in violation of the law.

Similar legislation has been used in the past to persecute government critics including the privately owned media through cooked up criminal cases that never stick in the courts. However, this time the government is fighting a losing battle. The Internet cannot be shut-down even by the most autocratic regimes especially by bankrupt ones.

As State media columnist Nathaniel Manheru, believed to be Mugabe’s spokesperson George Charamba, noted yesterday it would be folly for the government to try and regulate how Zimbabweans use social media.

Granted, internet use needs serious policing to curb threats to national security and clampdown on criminal activities such as the distribution of pornographic materials as well as violation of children’s rights, regulating social media is a Stone Age phenomenon.

The government, instead of harnessing the opportunities brought about by information technology wants to stifle its proliferation to the detriment of citizens.

It is high time the government listened to the concerns of the electorate without resorting to draconian instruments to silence them.

Zimbabwe has many pressing needs that include aligning several laws with the country’s Constitution and legislation regulating the use of social media is not one of those priorities.

The Standard: 

 

« NSA Hackers Demand One Million Bitcoin
UK Army Goes High-Tech With Future Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Dynamic Networks

Dynamic Networks

Dynamic Networks provide Managed Cloud Services; Unified Communications; Security & Compliance Services and Network & Infrastructure Services for both Public Sector and Private sector businesses.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.