1. DATA SOVEREIGNTY &
DIGITAL
TRANSFORMATION
Augustine CHII NGEK
Board Member, ISOC Cameroon Chapter
African Union Fellow on IGF
chii.ngek@gmail.com
IGFCA 23, YAOUNDE -CAMEROON ISOC Cameroon Chapter in rejuvenation
2. INTRODUCTION AND CONTEXT
THE STAKEHOLDERS IN DATA SOVEREIGNTY
ECOSYSTEM OF DATA SOVEREIGNTY
TYPES OF DATA SOVEREIGNTY
COUNTRIES OR ECONOMIC BLOCK WITH DATA SOVEREIGNTY
THE POSITION OF AFRICA IN DATA SOVEREIGHTY
AGENDA
2
3. 3
INTRODUCTION AND CONTEXT
Data sovereignty is about ensuring that data remains under the control and
jurisdiction of the country or organization that owns it, and that it is handled in a
manner that respects privacy and security.
Data sovereignty is often seen as a critical issue in the digital age, as data has become an
increasingly valuable and sensitive asset. It is particularly important for governments, as they
often handle sensitive citizen data, and for businesses that want to protect their intellectual
property and customer information.
The concept of data sovereignty has gained importance with the rise of cloud computing and
the outsourcing of data storage and processing to third-party providers. It has also become a
topic of concern in international relations, as governments seek to protect their citizens' data
from foreign surveillance and cyber threats.
4. WHO ARE THE STAKEHOLDERS IN
DATA SOVEREIGNTY?
The stakeholders in data sovereignty can vary depending on
the context, but some common stakeholders include:
1. GOVERNMENT, LEGISLATION AND compliance
national security
2. Businesses
3. Individuals
4. Data Protection Authorities
5. International Organizations
6. Cloud Service Providers
7. Cybersecurity Experts:
5. Ecosystem of data sovereignty
involves various components that work together to ensure the protection,
control, and ethical use of data.
Data Owners: individuals, organizations, or governments that have
legal rights and control over the data
Data Processors: are entities that handle and process data on behalf of
data owners. This can include cloud service providers, data analytics
firms, and other third-party service providers.
Data Protection Authorities provide guidance, investigate data
breaches, and impose penalties for non-compliance. Examples include
the Information Commissioner's Office (ICO) in the UK and the
European Data Protection Board (EDPB) in the EU.
Legal Frameworks:
Cybersecurity Measures: includes implementing strong encryption,
access controls, firewalls, and other security technologies.
Cybersecurity experts and professionals play a key role in designing and
implementing these measures
6. Data Governance Policies These policies address data quality, privacy,
security, and compliance, and ensure that data is handled ethically
and responsibly.
International Standards and Agreements: International standards,
such as the General Data Protection Regulation (GDPR) in the EU
Data Privacy Advocates: including NGOs and CSOs, work to raise
awareness about data privacy issues, advocate for stronger data
protection laws, and hold organizations accountable for their data
handling practices.
Data Subjects: refer to the individuals whose data is collected and
processed
Technology Solutions like encryption tools
ECOSYSTEM CONTINUES
7. Types of data sovereignty
Data sovereignty refers to the concept of
maintaining control and ownership over data,
including where it is stored, processed, and
transferred.
1.Physical Data Sovereignty:
2.Technical Data Sovereignty:
3.Legal Data Sovereignty:
4.Policy Data Sovereignty:
5.vendorl Data Sovereignty:
6.User Data Sovereignty:
8. Countries or economic blocks with data sovereignty
1. European Union (EU): The EU has implemented the General Data
Protection Regulation (GDPR),
2. Russia has implemented data localization laws that require personal
data of Russian citizens to be stored and processed within Russia.
3. China has implemented strict regulations on data sovereignty,
requiring companies to store and process certain types of data
within China.
4. Brazil has enacted the Brazilian General Data Protection Law (LGPD),
which establishes rules for the collection, storage, and processing of
personal data.
5. India has proposed data localization measures that would require
companies to store and process certain types of data within India.
6. South Korea has implemented data localization requirements for
certain sectors, such as finance and telecommunications.
9. What is the position of AFRICA in data sovereignty?
The position of Africa in data sovereignty varies across different countries and regions on
the continent:
• Data Protection Laws, South Africa has the Protection of Personal Information Act
(POPIA), which regulates the processing of personal information. Other countries, such
as Kenya, Nigeria, and Ghana, have also implemented data protection laws or are in the
process of enacting them.
• Data Localization: Nigeria's Data Protection Regulation requires that personal data of
Nigerian citizens be stored and processed within Nigeria.
• Regional Initiatives: There are regional initiatives in Africa that aim to promote data
sovereignty and data protection. The African Union (AU) has adopted the Convention
on Cyber Security and Personal Data Protection, which seeks to harmonize data
protection laws across African countries. The Economic Community of West African
States (ECOWAS) has also developed guidelines on data protection and privacy.
• . Cross-Border Data Transfers: African countries are also engaged in discussions and
negotiations regarding cross-border data transfers. Some countries are exploring
mechanisms to ensure that personal data transferred outside the continent is
adequately protected.
• Capacity Building: Many African countries are focusing on building capacity in data
protection and privacy.
10. PERSPECTIVE
This is a clarion call: Every African
country must start looking at data
more than oil and measures be taken
to protect it
11. THANKS FOR YOUR KEEN ATTENTION
Augustine CHII NGEK
chii.ngek@gmail.com
IGF.CA23, YAOUNDE CAMEROON 11 ISOC Cameroon Chapter in rejuvenation
11
Editor's Notes
Digital economy refers to an economy that is based on digital computing technologies. The digital economy is also sometimes called the Internet Economy, the New Economy, or Web Economy.