SlideShare a Scribd company logo
1 of 18
Enhancing Data Protection and Privacy in
Nigeria through the Data Protection Act
2019
GSMA – Principles of Mobile Privacy
June 2019
Chukwuemeka Nzeih
Digital Bridge Institute
Abuja - Nigeria
Introduction
 Data Protection Regulations are aimed at regulating the collection, collation,
storage and processing of personal data by private, public and government
entities, as well as safeguarding information of individuals obtained through such
digital processes.
 Such regulations also aims to achieve the concepts of Confidentiality, Integrity and
Availability.
 Nigeria has lagged behind in the development of a regulatory framework for data
protection, as there has been a dearth of data protection laws in the country.
 Hitherto, the void created by the lack of data protection laws was filled, albeit
inadequately by the Constitution of the Federal Republic of Nigeria, 1999 (as
amended) (the “Constitution”). Aggrieved persons sought refuge in Section 37 of
the Constitution
 Various stakeholders have clamoured for a comprehensive data protection
framework and law.
 In January 2019, the Nigeria Data Protection regulation was developed by the
The Need for Data Protection Law in Nigeria
https://youtu.be/krvDnUU_zzg
Data Privacy in Nigeria Pre-2019
 Prior to the year 2019 there was no specific
law for data protection in Nigeria.
 there is no other law that sets out detailed
provisions on the protection of the privacy
of individuals in Nigeria.
 People rely on Section 37 of the Constitution
which provides that: "The privacy of
citizens, their homes, correspondence,
telephone conversations and telegraphic
communications is hereby guaranteed and
protected".
Industry Specific Data Regulation Privacy in Nigeria Pre-2019
 Some Industry specific regulation existed for limited privacy within some
sectors. Examples are;
 The Nigerian Communication Commission (NCC) Consumer Code of Practice
Regulations 2007 which provides all licensees must take reasonable steps to
protect customer information against "improper or accidental disclosure"
and must ensure that such information is securely stored.
 This regulations also states that the customer information must “not be
transferred to any party except as otherwise permitted or required by other
applicable laws or regulations”.
 The NCC Regulations applies to all customer information relating to
customers of any nationality that use a licensee’s network in Nigeria
https://www.ncc.gov.ng/docman-main/legal-regulatory/regulations/102-consumer-code-of-practice-regulations-1/file
Industry Specific Data Regulation Privacy in Nigeria Pre-2019
 The National Information Technology Development Agency (NITDA) which is the
national authority that is responsible for planning, developing and promoting
the use of information technology in Nigeria issued a guidelines on data
protection (the “NITDA Guidelines“).
 The NITDA Guidelines recommends the minimum data protection requirements
for the collection, storage, processing, management, operation, and technical
controls for information and is currently the only set of regulations that
contains specific and detailed provisions on the protection, storage, transfer or
treatment of personal data.
 The NITDA Guidelines apply to government agencies at all strata as well as
private sector organisations that own, use or deploy information systems of in
Nigeria, and also apply to organisations based outside Nigeria if such
organisations process personal data of Nigerian residents.
https://www.uubo.org/media/1337/data-privacy-protection-in-nigeria.pdf
Industry Specific Data Regulation Privacy in Nigeria Pre-2019
 The NITDA Guidelines defined “personal data”
as: “any information relating to an identified
or identifiable natural person (data subject);
information relating to an individual, whether
it relates to his or her private, professional or
public life. It can be anything from a name,
address, a photo, an email address, bank
details, posts on social networking websites,
medical information, or a computer’s IP
address”.
https://www.uubo.org/media/1337/data-privacy-protection-in-nigeria.pdf
Effect of Absence of Data Protection Law
The absence of a comprehensive data protection law led to the prevalence of
following;
1. Prosecutorial Challenge;
2. Inability to combat cyber crime related to identity theft and data
breaches;
3. Inability to regulate the distribution of private data such as GSM Numbers
of subscribers by mobile operators;
4. The use of personal data for a different purpose for which it was
collected;
5. Repeated data breaches without repercussions.
6. Lack of effective security for data.
https://www.youtube.com/watch?v=6tezfN381Jw
The case for a National Law on Data Protection
a) Safeguarding the rights of natural persons to data privacy;
b) Fostering safe conduct of transactions involving the exchange of personal
data;
c) Preventing manipulation of personal data; and
d) ensuring that Nigerian businesses remain competitive in international trade
through the safeguards afforded by a just and equitable legal regulatory
framework on data protection and which regulatory framework is
consistent with global best practices.
Key tenets of a National Data Protection Law
Benefits of Nigeria Data Protection Regulation 2019
https://youtu.be/DQ1Q9BORaOk
1. Privacy Policy
2. Data Security
3. Third Party Data Processing Contracts
4. Data Protection Compliance Organisations
5. Data Subject Right of Objection
6. Penalty for default.
Key Contents of Nigeria Data Protection Regulation 2019
Key Players under the Data Protection Act 2019
Data
Subject
Data
Controller
Data
Processor
the person whose
identity is or may
be revealed from
the data;
Any person/corporate
who determines the
purpose and manner
for processing the
data; and
any person/corporate
who processes the data
in any form e.g. storing,
reproduction,
modification
1. Data must be collected and processed for lawful purposes with the consent of the
Data subject.
2. Data collected shall be adequate, accurate and without prejudice to the dignity of
human person.
3. Data shall be stored only for a certain period.
4. The Duty of Care and Accountability in respect of all personal data
Some stipulations of the Nigeria Data Protection Act 2019
Where consent (evidenced by an affirmative action) is given by the data subject;
 where the data subject is a party to a contract and the processing is
necessary for the contract’s performance or to take steps at the request of
the Data Subject before entering into the contract;
 where the processing is necessary for compliance with a legal obligation
to which the Data Controller is subject;
 where processing is necessary in order to protect the vital interests of the
Data Subject or of another natural person, and;
 where processing is necessary for the performance of a task carried out in
the public interest or in exercise of official public mandate vested in the
data controller.
Instances for Lawful Processing of Data
Implementation Challenges of the National Data Protection Regulation
 Very low awareness level.
 Weak Implementation and compliance Mechanism.
 Slow judicial and litigation process for prosecuting offenders.
 Lack of effective IT surveillance personnel and equipment.
Conclusion
 The Nigeria Data Protection Regulations is a giant leap and a step
forward in promoting data privacy and protection in Nigeria.
 The Regulation will help control the incessant cases of data breaches
in Nigeria.
 To achieve the objectives of the regulations user will need to be
continuously educated on about protecting their personal
information and advocate for the use of Privacy Enhancing
Technologies.
 A Multistakeholder approach will be the best fit in pursuing the
attainment of the dictates of this regulation.
Data Protection Act 2019 Enhances Privacy in Nigeria

More Related Content

What's hot

5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia HellasSpilios Georgakopoulos
 
Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta Mastel Indonesia
 
Gsma final project 5 g public policies in brazil 09212019
Gsma final project   5 g public policies in brazil 09212019Gsma final project   5 g public policies in brazil 09212019
Gsma final project 5 g public policies in brazil 09212019Gabriella De Salvio
 
Regulatory Aspects of NGMS Regime in Pakistan
Regulatory Aspects of NGMS Regime in PakistanRegulatory Aspects of NGMS Regime in Pakistan
Regulatory Aspects of NGMS Regime in PakistanHomaira Arif, PMP
 
Smart Cities and their use of 5G Communications - Article
Smart Cities and their use of 5G Communications - ArticleSmart Cities and their use of 5G Communications - Article
Smart Cities and their use of 5G Communications - ArticleTendayi Mnemo (MPM)
 
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG GustianaMastel Indonesia
 
5G Networks - What's next for Broadband
5G Networks - What's next for Broadband5G Networks - What's next for Broadband
5G Networks - What's next for Broadbandpaul young cpa, cga
 
5G Technology and Applications
5G Technology and Applications5G Technology and Applications
5G Technology and ApplicationsHau Chen Mike Lee
 
BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization Myles Freedman
 
What is next for Telecom (Broadband and Cell) - November 2021
What is next for Telecom (Broadband and Cell) - November 2021 What is next for Telecom (Broadband and Cell) - November 2021
What is next for Telecom (Broadband and Cell) - November 2021 paul young cpa, cga
 
Gsma presentation on 5 g the path to the next generation
Gsma presentation on 5 g the path to the next generationGsma presentation on 5 g the path to the next generation
Gsma presentation on 5 g the path to the next generationRefilwe Ramatlo
 
Day 2 C2C - Huawei -Broadband for All
Day 2 C2C - Huawei -Broadband for AllDay 2 C2C - Huawei -Broadband for All
Day 2 C2C - Huawei -Broadband for AllMyles Freedman
 
The Regulatory and Spectrum Management Scenario in Telecom Network Optimization
The Regulatory and Spectrum Management Scenario in Telecom Network OptimizationThe Regulatory and Spectrum Management Scenario in Telecom Network Optimization
The Regulatory and Spectrum Management Scenario in Telecom Network OptimizationArief Gunawan
 
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?NetSquared
 
SCF's Vision for the 5G Era
SCF's Vision for the 5G Era SCF's Vision for the 5G Era
SCF's Vision for the 5G Era Elizabeth Carter
 
Day 2 C2C - USAASA Engaging Africa's Youth
Day 2 C2C - USAASA Engaging Africa's YouthDay 2 C2C - USAASA Engaging Africa's Youth
Day 2 C2C - USAASA Engaging Africa's YouthMyles Freedman
 

What's hot (20)

5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas5G Digital Transformation Strategy in Nokia Hellas
5G Digital Transformation Strategy in Nokia Hellas
 
Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta Ovum ZTE Presentation Jakarta
Ovum ZTE Presentation Jakarta
 
Gsma final project 5 g public policies in brazil 09212019
Gsma final project   5 g public policies in brazil 09212019Gsma final project   5 g public policies in brazil 09212019
Gsma final project 5 g public policies in brazil 09212019
 
Regulatory Aspects of NGMS Regime in Pakistan
Regulatory Aspects of NGMS Regime in PakistanRegulatory Aspects of NGMS Regime in Pakistan
Regulatory Aspects of NGMS Regime in Pakistan
 
Smart Cities and their use of 5G Communications - Article
Smart Cities and their use of 5G Communications - ArticleSmart Cities and their use of 5G Communications - Article
Smart Cities and their use of 5G Communications - Article
 
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
 
5G Networks - What's next for Broadband
5G Networks - What's next for Broadband5G Networks - What's next for Broadband
5G Networks - What's next for Broadband
 
5G Technology and Applications
5G Technology and Applications5G Technology and Applications
5G Technology and Applications
 
5G and G5 in Smart Cities
5G and G5 in Smart Cities5G and G5 in Smart Cities
5G and G5 in Smart Cities
 
BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization BCN (Nigeria) strategies to promote broadband & digitization
BCN (Nigeria) strategies to promote broadband & digitization
 
What is next for Telecom (Broadband and Cell) - November 2021
What is next for Telecom (Broadband and Cell) - November 2021 What is next for Telecom (Broadband and Cell) - November 2021
What is next for Telecom (Broadband and Cell) - November 2021
 
Gsma presentation on 5 g the path to the next generation
Gsma presentation on 5 g the path to the next generationGsma presentation on 5 g the path to the next generation
Gsma presentation on 5 g the path to the next generation
 
4G Key Technologies Patent Landscape
4G Key Technologies Patent Landscape4G Key Technologies Patent Landscape
4G Key Technologies Patent Landscape
 
Ciberseguridad (Jornada TIC 2020)
Ciberseguridad (Jornada TIC 2020)Ciberseguridad (Jornada TIC 2020)
Ciberseguridad (Jornada TIC 2020)
 
Day 2 C2C - Huawei -Broadband for All
Day 2 C2C - Huawei -Broadband for AllDay 2 C2C - Huawei -Broadband for All
Day 2 C2C - Huawei -Broadband for All
 
DoD 5G Strategy 2020
DoD 5G Strategy 2020DoD 5G Strategy 2020
DoD 5G Strategy 2020
 
The Regulatory and Spectrum Management Scenario in Telecom Network Optimization
The Regulatory and Spectrum Management Scenario in Telecom Network OptimizationThe Regulatory and Spectrum Management Scenario in Telecom Network Optimization
The Regulatory and Spectrum Management Scenario in Telecom Network Optimization
 
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
 
SCF's Vision for the 5G Era
SCF's Vision for the 5G Era SCF's Vision for the 5G Era
SCF's Vision for the 5G Era
 
Day 2 C2C - USAASA Engaging Africa's Youth
Day 2 C2C - USAASA Engaging Africa's YouthDay 2 C2C - USAASA Engaging Africa's Youth
Day 2 C2C - USAASA Engaging Africa's Youth
 

Similar to Data Protection Act 2019 Enhances Privacy in Nigeria

Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014UsmanMAmeer
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulationGreg Ezeilo
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)Faidepro
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxJaeKim165097
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
KSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfKSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfDaviesParker
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERYashiVaidya
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacyEuphodia Maluleke
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategyTrustArc
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 

Similar to Data Protection Act 2019 Enhances Privacy in Nigeria (20)

Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
Final projet
Final  projetFinal  projet
Final projet
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
KSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfKSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdf
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Cyber safe lambeth | GDPR taster
Cyber safe lambeth | GDPR tasterCyber safe lambeth | GDPR taster
Cyber safe lambeth | GDPR taster
 
2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy2019 11-13 how to comply with ccpa as part of a global privacy strategy
2019 11-13 how to comply with ccpa as part of a global privacy strategy
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Data Protection Act 2019 Enhances Privacy in Nigeria

  • 1. Enhancing Data Protection and Privacy in Nigeria through the Data Protection Act 2019 GSMA – Principles of Mobile Privacy June 2019 Chukwuemeka Nzeih Digital Bridge Institute Abuja - Nigeria
  • 2. Introduction  Data Protection Regulations are aimed at regulating the collection, collation, storage and processing of personal data by private, public and government entities, as well as safeguarding information of individuals obtained through such digital processes.  Such regulations also aims to achieve the concepts of Confidentiality, Integrity and Availability.  Nigeria has lagged behind in the development of a regulatory framework for data protection, as there has been a dearth of data protection laws in the country.  Hitherto, the void created by the lack of data protection laws was filled, albeit inadequately by the Constitution of the Federal Republic of Nigeria, 1999 (as amended) (the “Constitution”). Aggrieved persons sought refuge in Section 37 of the Constitution  Various stakeholders have clamoured for a comprehensive data protection framework and law.  In January 2019, the Nigeria Data Protection regulation was developed by the
  • 3. The Need for Data Protection Law in Nigeria https://youtu.be/krvDnUU_zzg
  • 4. Data Privacy in Nigeria Pre-2019  Prior to the year 2019 there was no specific law for data protection in Nigeria.  there is no other law that sets out detailed provisions on the protection of the privacy of individuals in Nigeria.  People rely on Section 37 of the Constitution which provides that: "The privacy of citizens, their homes, correspondence, telephone conversations and telegraphic communications is hereby guaranteed and protected".
  • 5. Industry Specific Data Regulation Privacy in Nigeria Pre-2019  Some Industry specific regulation existed for limited privacy within some sectors. Examples are;  The Nigerian Communication Commission (NCC) Consumer Code of Practice Regulations 2007 which provides all licensees must take reasonable steps to protect customer information against "improper or accidental disclosure" and must ensure that such information is securely stored.  This regulations also states that the customer information must “not be transferred to any party except as otherwise permitted or required by other applicable laws or regulations”.  The NCC Regulations applies to all customer information relating to customers of any nationality that use a licensee’s network in Nigeria https://www.ncc.gov.ng/docman-main/legal-regulatory/regulations/102-consumer-code-of-practice-regulations-1/file
  • 6. Industry Specific Data Regulation Privacy in Nigeria Pre-2019  The National Information Technology Development Agency (NITDA) which is the national authority that is responsible for planning, developing and promoting the use of information technology in Nigeria issued a guidelines on data protection (the “NITDA Guidelines“).  The NITDA Guidelines recommends the minimum data protection requirements for the collection, storage, processing, management, operation, and technical controls for information and is currently the only set of regulations that contains specific and detailed provisions on the protection, storage, transfer or treatment of personal data.  The NITDA Guidelines apply to government agencies at all strata as well as private sector organisations that own, use or deploy information systems of in Nigeria, and also apply to organisations based outside Nigeria if such organisations process personal data of Nigerian residents. https://www.uubo.org/media/1337/data-privacy-protection-in-nigeria.pdf
  • 7. Industry Specific Data Regulation Privacy in Nigeria Pre-2019  The NITDA Guidelines defined “personal data” as: “any information relating to an identified or identifiable natural person (data subject); information relating to an individual, whether it relates to his or her private, professional or public life. It can be anything from a name, address, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer’s IP address”. https://www.uubo.org/media/1337/data-privacy-protection-in-nigeria.pdf
  • 8. Effect of Absence of Data Protection Law The absence of a comprehensive data protection law led to the prevalence of following; 1. Prosecutorial Challenge; 2. Inability to combat cyber crime related to identity theft and data breaches; 3. Inability to regulate the distribution of private data such as GSM Numbers of subscribers by mobile operators; 4. The use of personal data for a different purpose for which it was collected; 5. Repeated data breaches without repercussions. 6. Lack of effective security for data.
  • 10. a) Safeguarding the rights of natural persons to data privacy; b) Fostering safe conduct of transactions involving the exchange of personal data; c) Preventing manipulation of personal data; and d) ensuring that Nigerian businesses remain competitive in international trade through the safeguards afforded by a just and equitable legal regulatory framework on data protection and which regulatory framework is consistent with global best practices. Key tenets of a National Data Protection Law
  • 11. Benefits of Nigeria Data Protection Regulation 2019 https://youtu.be/DQ1Q9BORaOk
  • 12. 1. Privacy Policy 2. Data Security 3. Third Party Data Processing Contracts 4. Data Protection Compliance Organisations 5. Data Subject Right of Objection 6. Penalty for default. Key Contents of Nigeria Data Protection Regulation 2019
  • 13. Key Players under the Data Protection Act 2019 Data Subject Data Controller Data Processor the person whose identity is or may be revealed from the data; Any person/corporate who determines the purpose and manner for processing the data; and any person/corporate who processes the data in any form e.g. storing, reproduction, modification
  • 14. 1. Data must be collected and processed for lawful purposes with the consent of the Data subject. 2. Data collected shall be adequate, accurate and without prejudice to the dignity of human person. 3. Data shall be stored only for a certain period. 4. The Duty of Care and Accountability in respect of all personal data Some stipulations of the Nigeria Data Protection Act 2019
  • 15. Where consent (evidenced by an affirmative action) is given by the data subject;  where the data subject is a party to a contract and the processing is necessary for the contract’s performance or to take steps at the request of the Data Subject before entering into the contract;  where the processing is necessary for compliance with a legal obligation to which the Data Controller is subject;  where processing is necessary in order to protect the vital interests of the Data Subject or of another natural person, and;  where processing is necessary for the performance of a task carried out in the public interest or in exercise of official public mandate vested in the data controller. Instances for Lawful Processing of Data
  • 16. Implementation Challenges of the National Data Protection Regulation  Very low awareness level.  Weak Implementation and compliance Mechanism.  Slow judicial and litigation process for prosecuting offenders.  Lack of effective IT surveillance personnel and equipment.
  • 17. Conclusion  The Nigeria Data Protection Regulations is a giant leap and a step forward in promoting data privacy and protection in Nigeria.  The Regulation will help control the incessant cases of data breaches in Nigeria.  To achieve the objectives of the regulations user will need to be continuously educated on about protecting their personal information and advocate for the use of Privacy Enhancing Technologies.  A Multistakeholder approach will be the best fit in pursuing the attainment of the dictates of this regulation.