Zimbabwe bans electric geysers in bid to save power – The Zimbabwean

Zimbabwe is currently enduring power cuts of up to 18 hours a day as power generation remains greatly subdued due to a combination of drought, ageing equipment and lack of foreign currency to import power.

The country was on Wednesday producing 563 MW against demand of 1,200MW.

The drought experienced this year has severely reduced power generation at Kariba Hydro Power Station, one of the country’s main power plants.

The regulations, which shall not apply to existing premises with electrical geysers, are also meant to guide the installation, licensing, and operation of water heating systems that sue solar energy.

“No owner of the premises after the effective day of these regulations shall connect electrical geysers but may, at his or her own expense, install and use solar water heating systems,” the regulations said.

According to the regulations, all new buildings will have to be fitted with solar geysers and those who need electric geysers will need to apply for a special exemption.

The government said in 2018 the nation could save up to 280 megawatts of power through banning use of electric geysers.

Due to the prolonged power challenges, the government has been actively encouraging consumers to invest in alternative forms of energy such as solar but high solar installation costs are prohibiting many from doing so.

Two years after coup, Zimbabweans still long for economic change
Zimbabwe’s economy forecast to grow 3% next year – finance minister

Post published in: Business

Zimbabwe’s economy forecast to grow 3% next year – finance minister – The Zimbabwean

15.11.2019 6:14

HARARE (Reuters) – Zimbabwe’s economy is forecast to grow by 3% next year from a projected contraction of 6.5% this year, helped by improvements in agricultural output and electricity supplies, Finance Minister Mthuli Ncube said on Thursday.

Mthuli Ncube

Presenting the 2020 budget to parliament, Ncube also said the country’s budget deficit is projected at 1.5% of gross domestic product (GDP) in 2020 from 4% of GDP this year. (Reporting by MacDonald Dzirutwe, writing by Olivia Kumwenda-Mtambo, editing by Andrew Heavens)

Zimbabwe bans electric geysers in bid to save power
Zimbabwe ditches austerity and warns corruption is killing growth

Post published in: Business

Zimbabwe ditches austerity and warns corruption is killing growth – The Zimbabwean

Zimbabwean finance minister Mthuli Ncube arrives at parliament to present the national budget in Harare, November 14 2019. Picture: JEKESAI NJIKIZANA / AFP

Finance minister Mthuli Ncube said  Zimbabwe will ditch its crippling austerity measures and forecast 3% growth in 2020 after a projected 6.5% contraction in 2019, its worst downturn in a decade that saw increased public protests and widespread shortages.

Presenting his proposed ZWL$63.6bn budget for 2020 in parliament in Harare on Thursday Ncube said the economic rebound was based on expectations that Zimbabwe would record a better rainfall season, as well as improvements in electricity supply and infrastructure development.

“Economic recovery of up to 3% is projected in 2020, primarily premised on key assumptions that include a better rainfall season supported by increased support towards rehabilitation and development of irrigation infrastructure to sustain agriculture activities,” he said.

He said he expected agriculture to grow by 5% while mining was projected to rise by 4.7%.

Ncube said the country’s budget deficit was projected at 1.5% of gross domestic product (GDP) in 2020 from 4% of GDP this year.

The finance minister announced tax cuts including a marginally reduced value added tax (VAT) on non-luxury goods of  14.5% from 15%, effective in January 2020, to help Zimbabwe’s millions of poor and boost demand.

Corporate income tax will be lowered from 25% to 24%.

Ncube announced tax incentives for companies that create jobs to ease the country’s unemployment rate of more than 90%.

“The country’s economic challenges are surmountable provided we put our heads together as a nation and continue taking bold and decisive steps to open up and grow the economy,” he said. “This includes seriously pursuing policies that enhance production.”

The finance minister removed grain subsidies from  January and millers will be free to import maize.  The move may prove unpopular as it could drive up prices of  staples mealie meal, cooking oil and bread.

Ncube said monthly inflation is expected to fall to single digits in the first quarter of 2020 on the back of commitment by the RBZ to implement a “tight reserve money targeting framework”.

While the government has stopped publishing month-on-month inflation figures, the International Monetary Fund estimates Zimbabwe’s inflation rate at more than 300%, making it the second-highest in the world after Venezuela.

Ncube said Zimbabwe’s government must fight corruption to develop its economy. He allocated resources to establish a centralised internal audit unit as part of a national anticorruption strategy. He also called for a law to protect whistle-blowers.

“Government is losing resources through corrupt activities. In addition, corruption in some parastatals and local authorities has compromised some desired development outcomes. There is a risk that some development partners may withhold funding for critical programmes and projects,” he said.

Commenting on the budget, Harare-based economist John Robertson said that while the budget was “well presented”, the impact of the measures will most likely be felt after 2020.

“The longer-term view is now looking better, but 2020 still seems likely to be a difficult year. Almost all the support measures mentioned will take time to build up momentum and if they do become effective, their impact will most likely be felt during or after 2021, not in the coming year.

“Investors cannot be attracted while electricity demands cannot be met and the quickest of the power station projects, extensions to Hwange Power Station, requires another year,” he said.

Former finance minister and MDC Alliance legislator Tendai Biti said the budget was a reflection of hyperinflation. He called it an “illusion” and “underachievable”.

It Takes The Supreme Court A While To Really Get Moving

Cramming for the CCPA

Cramming for the CCPA

The California Consumer Privacy Act, the most significant privacy regulation ever enacted in the United States, takes effect in January 2020. Join us for a free webinar to learn more.

The California Consumer Privacy Act, the most significant privacy regulation ever enacted in the United States, takes effect in January 2020. Join us for a free webinar to learn more.

Who Stole My Face? The Risks Of Law Enforcement Use Of Facial Recognition Software

(Image via Getty)

Last week, RIT philosophy professor and expert on the ethical and privacy implications of technology, Evan Selinger, spoke to a group of lawyers in Rochester, New York, about the dangers presented by facial recognition software. The presentation, “Who Stole My Face? The Privacy Implications of Facial Recognition Technology,” was hosted by the committee that I chair for the Monroe County Bar Association, the Technology and Law Practice Committee, and was the brainchild of committee member Aleksander Nikolic, a Rochester IP attorney.

During his talk, Selinger contended that facial recognition technology should be banned across the board until regulations are enacted that are designed to control when and how it is used, and by whom. As he explains in a recent New York Times Op-Ed that he coauthored, facial recognition technology is unique in its invasiveness and in its potential for causing harm:

Facial recognition is truly a one-of-a-kind technology — and we should treat it as such. Our faces are central to our identities, online and off, and they are difficult to hide. People look to our faces for insight into our innermost feelings and dispositions. Our faces are also easier to capture than biometricsClose X like fingerprints and DNA, which require physical contact or samples. And facial recognition technology is easy to use and accessible, ready to plug into police body cameras and other systems.

According to Selinger, the use of facial recognition technology by law enforcement is particularly problematic due to its invasiveness and increasing pervasiveness. In that same article, Selinger outlines the risks presented when law enforcement officers seek to use facial recognition tools as part of their investigatory, screening, and crime prevention arsenals:

The essential and unavoidable risks of deploying these tools are becoming apparent. A majority of Americans have functionally been put in a perpetual police lineup simply for getting a driver’s license: Their D.M.V. images are turned into faceprints for government tracking with few limits. Immigration and Customs Enforcement officials are using facial recognition technology to scan state driver’s license databases without citizens’ knowing. Detroit aspires to use facial recognition for round-the-clock monitoring. Americans are losing due-process protections, and even law-abiding citizens cannot confidently engage in free association, free movement and free speech without fear of being tracked.

Another particularly concerning issue with facial recognition technology is that its underlying programming often results in biased outcomes that can have life-altering effects for those being screened by it. For example, as explained in an ACLU blog post on the issue, a study conducted by the ACLU revealed bias in the programming behind Amazon’s facial surveillance technology, Rekognition.

In the study, the software was used to compare photos of members of Congress to mugshots of people who had been arrested for a crime. Rekognition incorrectly identified 28 matches between members of Congress and the mugshots. As explained in the blog post, some members of Congress were affected by these errors more often than others:

The false matches were disproportionately of people of color, including six members of the Congressional Black Caucus, among them civil rights legend Rep. John Lewis (D-Ga.). These results demonstrate why Congress should join the ACLU in calling for a moratorium on law enforcement use of face surveillance.

The same software has also been shown to have a gender bias and has incorrectly identified women as men.

Because of these issues, some lawmakers are fighting back and are introducing bills designed to combat the bias inherent in facial recognition software. For example, in October, U.S. Congressional Representative Brenda Lawrence announced her plan to introduce legislation that would mandate the study of the racial biases found in facial recognition systems. And, in July U.S. Congressional Representative Rashida Tlaib introduced the “No Biometric Barriers Act of 2019,” which proposed a ban on the use of facial recognition technology at housing units funded by the Department of Housing and Urban Development, largely due to bias concerns.

Similarly, four cities have already imposed bans on the use of facial recognition tools by law enforcement including San Francisco, Somerville, Berkeley, and Oakland. And a statewide ban is in the works in California.

In his article, Selinger contends that the legislation passed thus far is a step in the right direction, but more drastic measures are required in order to combat the threat posed by the use of facial surveillance software by law enforcement and other public entities:

We support a wide-ranging ban on this powerful technology. But even limited prohibitions on its use in police body cams, D.M.V. databases, public housing and schools would be an important start.

Of course, the likelihood that far-reaching bans will be imposed prior to facial surveillance becoming ubiquitous is minimal. Let’s face it, the genie’s already out of the bottle and the legislative process tends to move at a snail’s pace, while technology is advancing at rates never before seen.

Facial recognition technology is already so pervasive that it’s going to be incredibly difficult to unring that bell. The implications of our newfound reality are already quite apparent and many assert that facial recognition technology is being misused by public and private entities alike. For evidence of that trend, you need look no further than the $35 billion class-action lawsuit currently pending against Facebook based on its alleged misuse of facial recognition data.

Who knows what extremes we’ll go to camouflage ourselves in a world where facial surveillance is the norm? There are already lines of clothing and other devices being released that are designed to confuse facial surveillance technology. No doubt there’s more of that to come. In fact, the very thought gives the 1997 movie Face/Off  newfound relevance. No wonder there’s a reboot in the works.

The bottom line: The future is already here, folks, and we’re all hapless participants in this reckless social experiment. Welcome to our newfound reality.


Niki BlackNicole Black is a Rochester, New York attorney and the Legal Technology Evangelist at MyCase, web-based law practice management software. She’s been blogging since 2005, has written a weekly column for the Daily Record since 2007, is the author of Cloud Computing for Lawyers, co-authors Social Media for Lawyers: the Next Frontier, and co-authors Criminal Law in New York. She’s easily distracted by the potential of bright and shiny tech gadgets, along with good food and wine. You can follow her on Twitter @nikiblack and she can be reached at niki.black@mycase.com.

How Does A Lawyer Get Competent in Tech? I Asked Twitter and Got 100+ Answers | LawSites

When I give presentations on lawyers’ ethical duty to be competent in technology, audience members often come up to me afterwards and ask something to the effect of, “Ok, I get it, but how do I become competent in technology?”

Preparing for another such talk this week, I thought I’d put the question to Twitter, asking others what their number one piece of advice would be for a lawyer wanting to become more competent in technology.

The more than 100 responses were so good that I decided to collect them here and share them with others who did not follow the thread. They range from “play World of Warcraft” to “learn the basics.”

So here goes.

Tightrope Walking The Digital Supply Chain (Part II)

(Image via Getty)

Ed. note: This is the second article in a two-part series about a heightened need for vigilance by companies around the cybersecurity of their supply chains in light of recent activity around the False Claims Act (FCA).  Part one addressed the legal landscape of the FCA as related to cyber risk and government supply chains and part two will address proactive steps that companies can take to reduce their FCA threat profile. 

The False Claims Act or FCA (31 U.S.C. §§ 3729 – 3733) was enacted by Congress in 1863 in response to concerns about the sale of fraudulent goods to the Union Army.  Today, the FCA is implicated if a company’s products or services introduce potential cybersecurity risks for requisitioning government agencies and those risks are not properly addressed when raised.

This craggy terrain calls for increased vigilance by companies selling hardware and software to government entities. “Business leaders should think carefully about what it means to managing the security supply chain and to manage your security towards outcomes,” remarked Chris Johnson, Global Compliance Lead for Google Cloud at CyberTalks, presented by CyberScoop in Washington, D.C., on October 24, 2019.

While companies like Nisos (disclosure: I work here) help assess supply chain vulnerabilities by performing attack simulations, vulnerability assessments, and threat investigations, it is imperative that companies adopt internal best practices to stay out of the crosshairs of the FCA.  “Strong, proactive steps are the first lines of defense of your business from the whistleblower claims,” according to Chris Brewster, Administrative Counsel of the House of Representatives.

The Best Defense is a Strong Offense

The following are recommendations from National Institute of Standards and Technology and other industry experts on how to create a defensible perimeter around a corporate supply chain:

  • Get clear on government requirements: Before entering into a contract, government contractors should scrutinize and document cybersecurity requirements and assess the company’s ability to comply with those requirements, according to DLA Piper. Negotiate the terms of the contract carefully and ensure that language describing compliance activities, employee training, and data protection procedures accurately reflects company practices.
  • Command and control third-party software and components: Be prescriptive about security requirements associated with third-party wares in all contracts. Once a vendor is accepted in the formal supply chain, open up discussions about vulnerabilities and security gaps software when possible and unpack, inspect, and x-ray parts before definitively accepting them.
  • Make security inextricable: Establish a secure software development lifecycle process for all software.  Implement training for all engineers and employees in charge of supply chain cybersecurity and bake awareness and compliance into the overall employee experience.  According to the Compliance Resource Center, organizations should educate employees on state law requirements pertaining to civil or criminal FCA penalties, whistleblower rights, and internal requirements for preventing, detecting, and reporting fraud waste and abuse.  “By conducting employee training that emphasizes compliance and encouraging early internal reporting of potential issues before they ripen into FCA claims, companies can significantly reduce their threat profile,” advises Brewster.
  • Increase automation: When possible, automate manufacturing and testing regimes to reduce the risk of human error.
  • Document and track risk: Document activities and controls related to cybersecurity, such as operational assessments, analyses regarding whether the company possesses information that requires protection, and any correspondence with the government regarding exceptions, waivers, or applicability of cybersecurity requirements, according to DLA Piper.
  • Open the lines of communication: Establish a transparent culture where potential whistleblowers are taken seriously.  Ensure that managers and HR are prepared to receive and respond to insider concerns before insiders take their concerns to regulators or lawyers.
  • Demonstrate diligence in HR documentation: Executives and managers should be on guard for disgruntled employees who may have incentives to commit fraud in order to make false whistleblower accusations after termination.  While individuals who commit fraud as a whistleblower are barred from recovery for their own fraud, the cost and feat of proving the fraud are often high hurdles for a business.  Mitigate against this potential threat by documenting employee performance, negative reviews, and reasons for termination.  Establishing a protective backdrop in this manner can help refute allegations that the employee was terminated as retaliation for trying to prevent a false claim from being reported to the government.
  • Establish a ”security handshake” for software and hardware: Secure booting processes should look for authentication codes and the system should not boot if codes are not recognized. Programs should capture “as built” component identity data for each assembly and automatically link the component identity data to sourcing information.
  • Procure legacy support for products and platforms: Assure a continuous supply of authorized IP and parts to maintain continuity over systems. When legacy systems no longer have adequate support options, consider the vulnerabilities posed by the inability to patch or remediate.
  • Limit access by third-party service vendors: Limit software access to as few vendors as possible. Limit hardware vendors’ physical access to mechanical systems and restrict access to control systems. Implement strong controls around physical access including maintenance of visitor logs and on-site supervision of vendors.

Recent FCA cases mark the increased vigilance required of government contractors, especially around cybersecurity requirements in supply chains.  Implementing front-end measures like strong compliance programs, proper vetting of contract requirements, documenting HR issues, and limiting vendor access can substantially lower your company’s risk profile.  Equally important is the need to adopt a culture of compliance which attends to insider concerns before they evolve into FCA claims and send companies down the slippery slope of litigation.


Jennifer DeTrani is General Counsel and EVP of Nisos, a technology-enabled cybersecurity firm.  She co-founded a secure messaging platform, Wickr, where she served as General Counsel for five years.  You can connect with Jennifer on Wickr (dtrain), LinkedIn or by email at dtrain@nisos.com.

California AG’s Legal Battle With Ashford University Rages On

(Photo via iStock)

San Diego Superior Court Judge Eddie C. Sturgeon jokingly boasted at one point during a series of hearings last Friday that even though some Los Angeles courts were setting trials as far out as 2021, he was only scheduling for 2020.

Then the attorneys in the People of the State of California v. Ashford University case came forward for their case management conference.

A lawyer for Ashford said that since there were roughly 40 more depositions to be completed in the case filed in late 2017, a trial date for April 2021 should be set.

A deputy attorney general suggested even that timeline may be ambitious given some of the litigation issues needing to be ironed out.

Sturgeon set a trial date for late April 2021.

The complaint filed by California Attorney General Xavier Becerra’s office alleged for-profit Ashford and its then San Diego-based parent company, Bridgepoint Education, made false promises and provided students with inaccurate information to get them to enroll.

The AG also accused the defendants of illegal debt collection practices against students who were having difficulty paying their bills.

“The People seek an injunction preventing further misconduct, restitution for victims, civil penalties, the Attorney General’s costs of suit, and other relief that the Court deems just, proper and equitable,” the AG’s office wrote in a recent case management statement.

Ashford and its renamed parent company, Zovio Inc., called the AG’s complaint “politically-motivated.”

“The allegations of any pattern or practice of condoned misrepresentations, fraudulent conduct, and misleading advertising are unfounded and false,” the defendants wrote in the recent case management statement. “At all times relevant to this action, Defendants acted in good faith, having implemented a corporate compliance program and other safeguards — which were carefully designed and implemented based on the model for compliance programs established under federal regulations — to prevent, detect, and remedy the type of conduct being challenged by the AG in this case.”

The defendants also highlighted that prior to the AG filing its suit, they entered into settlement agreements with the state of Iowa and the U.S. Consumer Financial Protection Bureau “that addressed virtually the identical issues raised in the complaint.”

In 2014, Ashford and Bridgepoint Education agreed to pay Iowa $7.25 million to settle allegations that they violated the state’s Consumer Fraud Act.

“The company also must comply with minimum standards in its future representations and disclosures to prospective and current students nationwide,” the Iowa Attorney General’s Office said.

Two years later, the company agreed to forgive loans and issue refunds totaling $23.5 million to resolve the Consumer Financial Protection Bureau’s findings that Bridgepoint deceived students into taking out loans that cost more than advertised. Bridgepoint also agreed to pay the bureau an $8 million civil penalty.

The bureau’s release about the consent order noted that the California Attorney General’s Office assisted with the investigation.

The AG acknowledged in the recent case management statement in the San Diego case that it did assist with CFPB with its investigation, including participating in two settlement meetings.

“Defendants ultimately chose to approach the CFPB alone with a settlement proposal which CFPB accepted,” the AG’s office wrote. “The People were not a party to and had no standing to object to Defendants’ settlements with the Iowa Attorney General or the CFPB. Furthermore, this case covers different issues than Defendants’ settlements with the Iowa Attorney General’s Office and CFPB.”

Since the filing of the California AG’s case, Bridgepoint not only changed its name to Zovio, but also moved its headquarters to Arizona earlier this year. In addition, Ashford is working to convert from a for-profit to a nonprofit.

In the meantime, the school and its parent company will continue contending with the California AG’s suit.


Lyle Moran is a freelance writer in San Diego who handles both journalism and content writing projects. He previously reported for the Los Angeles Daily Journal, San Diego Daily Transcript, Associated Press, and Lowell Sun. He can be reached at lmoransun@gmail.com and found on Twitter @lylemoran.