Securing Judicial Information: Assessment of Records Security in Nyahururu and Nakuru Law Courts
Main Article Content
Abstract
Records play an integral role in the administration of justice and overall protection of human rights. Court records provide information, testimonies and evidence about cases presented; thereby, impacting the promptness and fairness of judgments rendered by judicial officials. Nonetheless, security breaches in handling of court records have resulted in the occurrence of missing files and inadvertent exposure of confidential information. These breaches have led to delays and significantly impacted the efficient administration of justice. This study examined the measures put in place to secure records in a bid to foster administration of justice at the Nakuru and Nyahururu law courts. The Records Continuum Model (RCM) guided the study. A descriptive survey design was utilized, targeting the 72 staff members from Nakuru and Nyahururu law courts. Due to the small population size, a census sampling technique was employed, resulting in a sample of 72 staff. Both questionnaires and interviews were used to collect data. Pretesting was done to check the validity and reliability of research tools, in tandem with expert review. Percentages and frequencies analyzed the quantitative data, while thematic analysis was used on the qualitative data. The findings revealed that law courts have implemented measures to protect court records. Nevertheless, there is room for further enhancement of measures put in place to ensure security of court records. The study concluded that there is a positive correlation between security measures and the promotion of judicial justice administration, and the need to therefore up-scale security measures. It recommends a comprehensive approach to revamp security measures at the law courts; integration of robust policies and innovation technologies in the protection of records; professional development programs for staff to enhance their competencies in handling security protocols; and regular monitoring and auditing of user access in order to detect and address unauthorized activities promptly.
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
I/We agree to transfer the copyright of this manuscript to the International Journal of Professional Practice (The IJPP) in the event that the manuscript is published in the Journal.
I/We give the undersigned authors of the manuscript have made the following declaration:
(a) That I/We have made substantial contribution during the conception and design, or acquisition of data, or analysis and interpretation of the data,
(b) That I/We have participated in drafting the article or revising it critically for important intellectual content,
(c) That I/We have read and confirm the content of the manuscript and have agreed to it,
(d) That I/We have participated sufficiently in the work to take public responsibility for appropriate portions of the content of the paper,
(e) That I/We give guarantee that the content of the manuscript is original, and has not beenvpublished elsewhere and is not currently being considered for publication by another journal.