SlideShare a Scribd company logo
1 of 11
DATA SOVEREIGNTY &
DIGITAL
TRANSFORMATION
Augustine CHII NGEK
Board Member, ISOC Cameroon Chapter
African Union Fellow on IGF
chii.ngek@gmail.com
IGFCA 23, YAOUNDE -CAMEROON ISOC Cameroon Chapter in rejuvenation
 INTRODUCTION AND CONTEXT
 THE STAKEHOLDERS IN DATA SOVEREIGNTY
 ECOSYSTEM OF DATA SOVEREIGNTY
 TYPES OF DATA SOVEREIGNTY
 COUNTRIES OR ECONOMIC BLOCK WITH DATA SOVEREIGNTY
 THE POSITION OF AFRICA IN DATA SOVEREIGHTY
AGENDA
2
3
INTRODUCTION AND CONTEXT
 Data sovereignty is about ensuring that data remains under the control and
jurisdiction of the country or organization that owns it, and that it is handled in a
manner that respects privacy and security.
 Data sovereignty is often seen as a critical issue in the digital age, as data has become an
increasingly valuable and sensitive asset. It is particularly important for governments, as they
often handle sensitive citizen data, and for businesses that want to protect their intellectual
property and customer information.
 The concept of data sovereignty has gained importance with the rise of cloud computing and
the outsourcing of data storage and processing to third-party providers. It has also become a
topic of concern in international relations, as governments seek to protect their citizens' data
from foreign surveillance and cyber threats.
WHO ARE THE STAKEHOLDERS IN
DATA SOVEREIGNTY?
The stakeholders in data sovereignty can vary depending on
the context, but some common stakeholders include:
1. GOVERNMENT, LEGISLATION AND compliance
national security
2. Businesses
3. Individuals
4. Data Protection Authorities
5. International Organizations
6. Cloud Service Providers
7. Cybersecurity Experts:
Ecosystem of data sovereignty
involves various components that work together to ensure the protection,
control, and ethical use of data.
 Data Owners: individuals, organizations, or governments that have
legal rights and control over the data
 Data Processors: are entities that handle and process data on behalf of
data owners. This can include cloud service providers, data analytics
firms, and other third-party service providers.
 Data Protection Authorities provide guidance, investigate data
breaches, and impose penalties for non-compliance. Examples include
the Information Commissioner's Office (ICO) in the UK and the
European Data Protection Board (EDPB) in the EU.
 Legal Frameworks:
 Cybersecurity Measures: includes implementing strong encryption,
access controls, firewalls, and other security technologies.
Cybersecurity experts and professionals play a key role in designing and
implementing these measures
 Data Governance Policies These policies address data quality, privacy,
security, and compliance, and ensure that data is handled ethically
and responsibly.
 International Standards and Agreements: International standards,
such as the General Data Protection Regulation (GDPR) in the EU
 Data Privacy Advocates: including NGOs and CSOs, work to raise
awareness about data privacy issues, advocate for stronger data
protection laws, and hold organizations accountable for their data
handling practices.
 Data Subjects: refer to the individuals whose data is collected and
processed
 Technology Solutions like encryption tools
ECOSYSTEM CONTINUES
Types of data sovereignty
Data sovereignty refers to the concept of
maintaining control and ownership over data,
including where it is stored, processed, and
transferred.
1.Physical Data Sovereignty:
2.Technical Data Sovereignty:
3.Legal Data Sovereignty:
4.Policy Data Sovereignty:
5.vendorl Data Sovereignty:
6.User Data Sovereignty:
Countries or economic blocks with data sovereignty
1. European Union (EU): The EU has implemented the General Data
Protection Regulation (GDPR),
2. Russia has implemented data localization laws that require personal
data of Russian citizens to be stored and processed within Russia.
3. China has implemented strict regulations on data sovereignty,
requiring companies to store and process certain types of data
within China.
4. Brazil has enacted the Brazilian General Data Protection Law (LGPD),
which establishes rules for the collection, storage, and processing of
personal data.
5. India has proposed data localization measures that would require
companies to store and process certain types of data within India.
6. South Korea has implemented data localization requirements for
certain sectors, such as finance and telecommunications.
What is the position of AFRICA in data sovereignty?
The position of Africa in data sovereignty varies across different countries and regions on
the continent:
• Data Protection Laws, South Africa has the Protection of Personal Information Act
(POPIA), which regulates the processing of personal information. Other countries, such
as Kenya, Nigeria, and Ghana, have also implemented data protection laws or are in the
process of enacting them.
• Data Localization: Nigeria's Data Protection Regulation requires that personal data of
Nigerian citizens be stored and processed within Nigeria.
• Regional Initiatives: There are regional initiatives in Africa that aim to promote data
sovereignty and data protection. The African Union (AU) has adopted the Convention
on Cyber Security and Personal Data Protection, which seeks to harmonize data
protection laws across African countries. The Economic Community of West African
States (ECOWAS) has also developed guidelines on data protection and privacy.
• . Cross-Border Data Transfers: African countries are also engaged in discussions and
negotiations regarding cross-border data transfers. Some countries are exploring
mechanisms to ensure that personal data transferred outside the continent is
adequately protected.
• Capacity Building: Many African countries are focusing on building capacity in data
protection and privacy.
PERSPECTIVE
This is a clarion call: Every African
country must start looking at data
more than oil and measures be taken
to protect it
THANKS FOR YOUR KEEN ATTENTION
Augustine CHII NGEK
chii.ngek@gmail.com
IGF.CA23, YAOUNDE CAMEROON 11 ISOC Cameroon Chapter in rejuvenation
11

More Related Content

Similar to DATA SOVEREIGHTY IGF.pptx

Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Data Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance StrategiesData Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance StrategiesShyamMishra72
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)Faidepro
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
data privacy in digital technology .pptx
data privacy in digital technology  .pptxdata privacy in digital technology  .pptx
data privacy in digital technology .pptxafruafrid5
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...Rabelani Dagada
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...Cedar Financial
 
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...Cedar Financial
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 

Similar to DATA SOVEREIGHTY IGF.pptx (20)

Data protection act
Data protection act Data protection act
Data protection act
 
Data Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance StrategiesData Privacy Laws: A Global Overview and Compliance Strategies
Data Privacy Laws: A Global Overview and Compliance Strategies
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
data privacy in digital technology .pptx
data privacy in digital technology  .pptxdata privacy in digital technology  .pptx
data privacy in digital technology .pptx
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
 
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

DATA SOVEREIGHTY IGF.pptx

  • 1. DATA SOVEREIGNTY & DIGITAL TRANSFORMATION Augustine CHII NGEK Board Member, ISOC Cameroon Chapter African Union Fellow on IGF chii.ngek@gmail.com IGFCA 23, YAOUNDE -CAMEROON ISOC Cameroon Chapter in rejuvenation
  • 2.  INTRODUCTION AND CONTEXT  THE STAKEHOLDERS IN DATA SOVEREIGNTY  ECOSYSTEM OF DATA SOVEREIGNTY  TYPES OF DATA SOVEREIGNTY  COUNTRIES OR ECONOMIC BLOCK WITH DATA SOVEREIGNTY  THE POSITION OF AFRICA IN DATA SOVEREIGHTY AGENDA 2
  • 3. 3 INTRODUCTION AND CONTEXT  Data sovereignty is about ensuring that data remains under the control and jurisdiction of the country or organization that owns it, and that it is handled in a manner that respects privacy and security.  Data sovereignty is often seen as a critical issue in the digital age, as data has become an increasingly valuable and sensitive asset. It is particularly important for governments, as they often handle sensitive citizen data, and for businesses that want to protect their intellectual property and customer information.  The concept of data sovereignty has gained importance with the rise of cloud computing and the outsourcing of data storage and processing to third-party providers. It has also become a topic of concern in international relations, as governments seek to protect their citizens' data from foreign surveillance and cyber threats.
  • 4. WHO ARE THE STAKEHOLDERS IN DATA SOVEREIGNTY? The stakeholders in data sovereignty can vary depending on the context, but some common stakeholders include: 1. GOVERNMENT, LEGISLATION AND compliance national security 2. Businesses 3. Individuals 4. Data Protection Authorities 5. International Organizations 6. Cloud Service Providers 7. Cybersecurity Experts:
  • 5. Ecosystem of data sovereignty involves various components that work together to ensure the protection, control, and ethical use of data.  Data Owners: individuals, organizations, or governments that have legal rights and control over the data  Data Processors: are entities that handle and process data on behalf of data owners. This can include cloud service providers, data analytics firms, and other third-party service providers.  Data Protection Authorities provide guidance, investigate data breaches, and impose penalties for non-compliance. Examples include the Information Commissioner's Office (ICO) in the UK and the European Data Protection Board (EDPB) in the EU.  Legal Frameworks:  Cybersecurity Measures: includes implementing strong encryption, access controls, firewalls, and other security technologies. Cybersecurity experts and professionals play a key role in designing and implementing these measures
  • 6.  Data Governance Policies These policies address data quality, privacy, security, and compliance, and ensure that data is handled ethically and responsibly.  International Standards and Agreements: International standards, such as the General Data Protection Regulation (GDPR) in the EU  Data Privacy Advocates: including NGOs and CSOs, work to raise awareness about data privacy issues, advocate for stronger data protection laws, and hold organizations accountable for their data handling practices.  Data Subjects: refer to the individuals whose data is collected and processed  Technology Solutions like encryption tools ECOSYSTEM CONTINUES
  • 7. Types of data sovereignty Data sovereignty refers to the concept of maintaining control and ownership over data, including where it is stored, processed, and transferred. 1.Physical Data Sovereignty: 2.Technical Data Sovereignty: 3.Legal Data Sovereignty: 4.Policy Data Sovereignty: 5.vendorl Data Sovereignty: 6.User Data Sovereignty:
  • 8. Countries or economic blocks with data sovereignty 1. European Union (EU): The EU has implemented the General Data Protection Regulation (GDPR), 2. Russia has implemented data localization laws that require personal data of Russian citizens to be stored and processed within Russia. 3. China has implemented strict regulations on data sovereignty, requiring companies to store and process certain types of data within China. 4. Brazil has enacted the Brazilian General Data Protection Law (LGPD), which establishes rules for the collection, storage, and processing of personal data. 5. India has proposed data localization measures that would require companies to store and process certain types of data within India. 6. South Korea has implemented data localization requirements for certain sectors, such as finance and telecommunications.
  • 9. What is the position of AFRICA in data sovereignty? The position of Africa in data sovereignty varies across different countries and regions on the continent: • Data Protection Laws, South Africa has the Protection of Personal Information Act (POPIA), which regulates the processing of personal information. Other countries, such as Kenya, Nigeria, and Ghana, have also implemented data protection laws or are in the process of enacting them. • Data Localization: Nigeria's Data Protection Regulation requires that personal data of Nigerian citizens be stored and processed within Nigeria. • Regional Initiatives: There are regional initiatives in Africa that aim to promote data sovereignty and data protection. The African Union (AU) has adopted the Convention on Cyber Security and Personal Data Protection, which seeks to harmonize data protection laws across African countries. The Economic Community of West African States (ECOWAS) has also developed guidelines on data protection and privacy. • . Cross-Border Data Transfers: African countries are also engaged in discussions and negotiations regarding cross-border data transfers. Some countries are exploring mechanisms to ensure that personal data transferred outside the continent is adequately protected. • Capacity Building: Many African countries are focusing on building capacity in data protection and privacy.
  • 10. PERSPECTIVE This is a clarion call: Every African country must start looking at data more than oil and measures be taken to protect it
  • 11. THANKS FOR YOUR KEEN ATTENTION Augustine CHII NGEK chii.ngek@gmail.com IGF.CA23, YAOUNDE CAMEROON 11 ISOC Cameroon Chapter in rejuvenation 11

Editor's Notes

  1. Digital economy refers to an economy that is based on digital computing technologies. The digital economy is also sometimes called the Internet Economy, the New Economy, or Web Economy.