SlideShare a Scribd company logo
AFRICAN UNION CONVENTION ON
CYBER SECURITY
AND PERSONAL DATA PROTECTION
and
Mobile Privacy Principles
Final projet on Principles of Mobile Privacy courses gsmatraining
By : Serge parfait Goma
plan
➢ Context
➢ What are we talking about ?
➢ What is mobile privacy principles ?
➢ What is african union convention on cspdp ?
➢ mobile privacy principles vs african union
convention on cspdp
➢ Analyse
➢ Challenges
➢ Suggestion
➢ references
A single profil can include more
1500 data point (a person
sexuality, browers history, political
affliation, medical records.
Ex :
acxiom claim to have 10 % of
world people datas
is not only business in 2013
snowden show that vast regime
of mass governement surveillance
programmes .
context
In digital age, data play a
huge role in our every day
life is presenting in various
way
example: online shoping you
have to type your name,
email addres, address, but
data collecting can also be
less visible than this
exemple
what are we talking about ??
● privacy ?
The article 12 of the unversal
declaration of Human rights
say:
no one shall be subjected to
arbitrary interference with
privacy ,family, home or
correspondence
everyone has the right the
protection of the law against
such interference or attacks
Data protection
Data protection is not the same thing as
privacy, privacy is a broad concept
refering to the condition with enablyng
basic fundation of human dignity and
autonomy
data protection is more specific it
concerns in te way campany and third
parties handle confidential information of
constumer
data
Protection ?
Data protection
What is mobile privacy principles ?
These principles were developed in 2011 and
describe the way in which mobile consumers’
privacy should be respected and protected
when consumers use mobile applications and
services that access, use or collect their
personal information.
based on recognised and
internationally accepted principles on privacy and data
protection. The key overarching objective of these
principles is to foster business practices and standards
that deliver meaningful transparency, notice, choice and
control for mobile users with regards to their personal
information and the safeguarding of their privacy.
The GSMA represents the
interests of mobile operators
worldwide, uniting nearly 800
operators with more than 250
companies in the broader
mobile ecosystem,including
handset and device makers,
software
companies,equipment
providers and internet
companies,as well as
organisations in adjacent
industry sectors. The GSMA
also produces industry-
leading events such
as Mobile World Congress,
Mobile World Congress
Shanghai and the Mobile 360
Series conferences.
I
Overview on GSMA
II
III
What is AFRICAN UNION CONVENTION ON
CYBER SECURITY AND PERSONAL DATA PROTECTION ?
Our work will focus on the aspect of personal data protection
This an establishment of a regulatory framework on
cyber-security and personal data protection takes into
account the requirements of respect for the rights of
citizens, guaranteed under the fundamental texts of
domestic law and protected by international human rights
Conventions and Treaties, particularly the African Charter
on Human and Peoples' Rights;
I
II
The AU CCSPDP is a Legal
Framework for
Cyber-security and Personal
Data Protection embodies
the existing commitments of
African Union Member
States at sub-regional,
regional and international
levels to build
the Information Society.
Is aims at defining the
objectives and broad
orientations of the
Information Society in Africa
and strengthening existing
legislations on Information
and Communication
Technologies (ICTs) of
Member States and the
Regional Economic
Communities (RECs);
This an establishment of a regulatory framework on
cyber-security and personal data protection takes into
account the requirements of respect for the rights of
citizens, guaranteed under the fundamental texts of
domestic law and protected by international human rights
Conventions and Treaties, particularly the African Charter
on Human and Peoples' Rights;
Our focus
High level privacy principles AU convention on cyber security and
personal data protection
1
Openness, Transparency and Notice
Responsible persons shall be open and honest
with users and will ensure users are provided
with clear, prominent and timely information
regarding their identity and data privacy
practices. Users shall be
provided with information about persons
collecting personal information about them, the
purposes of an application or service, and about
the access, collection, sharing and further use of
a users’ persona information, including to whom
their personal information may be disclosed,
enabling users to make informed decisions
about whether to use a mobile application or
service
3
Purpose and Use
The access, collection, sharing, disclosure and
further use of users’ personal information shall
be limited to meeting legitimate business
purposes, such as providing applications or
services as requested by users, or to otherwise
meet legal obligations.
5User Choice and Control
Users shall be given opportunities to
exercise meaningful choice, and control
over their personal information
Articles 13
Principle 5: Principle of transparency of
personal data processing
The principle of transparency requires
mandatory disclosure of information on personal
data by the data controller.
2
Articles 13
Principle 3: Principle of purpose, relevance and storage
of processed personaldata
a) Data collection shall be undertaken for specific, explicit
and legitimate purposes, and not further processed in a way
incompatible with those purposes;
b) Data collection shall be adequate, relevant and not
excessive in relation to the purposes for which they are
collected and further processed;
4
Articles 17 Right of access
Article 18: Right to object
Articles 19 :Right of rectification or
erasure
6
High level privacy principles AU convention on cyber security and
personal data protection
7Data Minimisation and Retention
Only the minimum personal information
necessary to meet legitimate business purposes
and to deliver, provision, maintain or develop
applications and services should be collected
and otherwise accessed and used. Personal
information must not be kept for longer than is
necessary for those legitimate business
purposes or to meet legal obligations and should
subsequently be deleted or rendered
anonymous
9Respect User Rights
Users should be provided with
information about, and an easy means
to exercise, their rights
over the use of their personal
information.
8
Articles 13
Principle 3: Principle of purpose, relevance and
storage of processed personaldata
a) Data collection shall be undertaken for specific,
explicit and legitimate purposes, and not further
processed in a way incompatible with those
purposes;…
Article 22:
Storage obligations
Personal data shall be kept for no longer than is
necessary for the purposes for which
the data were collected or processed
10
Article 16:
Right to information
The data controller shall provide the
natural person whose data are to be
processed with the following information,
no later than the time when the data are
collected, and regardless of the means
and facilities used, with the following
information:
High level privacy principles AU convention on cyber security and
personal data protection
11Security
Personal information must be
protected, using reasonable safeguards
appropriate to the
sensitivity of the information.
12
Article 21:
Security obligations
The data controller must take all appropriate
precautions, according to the nature of the
data, and in particular, to prevent such data from
being altered or destroyed, or
accessed by unauthorized third parties
Principle 6: Principle of confidentiality and
security of personal data processing
a) Personal data shall be processed
confidentially and protected, in particular
where the processing involves transmission of
the data over a network;
analyse
● We notice that they are same of important and specifics
principles and aspect of mobile privacy principles are missing
in the personal data protection convention of african union,
● those relevent point are not specificaly notice in the « chapter
II : personal data protection » we can list same principles and
aspects like :
– Children and Adolescents
– Education
– Accountability and Enforcement :
– Code and standards « concept of privacy by design »
Challenges
They still a lot to do regarding
digital laws in africa, privacy
and protection is one of the
biggest challenge in afrique
suggestion
● Make the promotion of african union convention on
cyber security and personal data protection.
● Create forum of discussion on the existing
convention base on comparaison study.
● Create open and multisteakholder task force to work
on update, impact and adaptability from the local
legislation to the african union framework
●
References
● https://www.gsma.com/publicpolicy/mobile-privacy-principles
● https://au.int/sites/default/files/treaties/29560-treaty-0048_-_african_union_conven
tion_on_cyber_security_and_personal_data_protection_e.pdf
,
● http://www.mfwa.org/wp-content/uploads/2017/09/brochureMFWA17.pdf
● https://www.youtube.com/watch?v=6vNxslcf9AE
● 05_ecsg_privacyframewk.pdf
● http://www.intuitive-
design.co.uk/clients/GSM/Annual_Report_2017/NonFinancial/index.html
●
https://www.youtube.com/watch?v=j6fO6JVGGHg
Thanks very much

More Related Content

What's hot

Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
Endcode_org
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
Priyanka Aash
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
Endcode_org
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
Home
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
IBM Business Insight
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
Endcode_org
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
primeteacher32
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Home
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Cyberlaw
CyberlawCyberlaw
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
WilmerHale
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
YUSRA FERNANDO
 

What's hot (20)

Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
S719a
S719aS719a
S719a
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 

Similar to Final projet

Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
JaeKim165097
 
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Nzeih Chukwuemeka
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
Euphodia Maluleke
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
UsmanMAmeer
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
Rohana K Amarakoon
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
UsmanMAmeer
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
AugustineCHIINgek
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
Charles Mok
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
Greg Ezeilo
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Symantec
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
DMI
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Arazim Sheu
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
Francesca Kabaso
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 

Similar to Final projet (20)

Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Data protection act
Data protection act Data protection act
Data protection act
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 

Recently uploaded

一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 

Recently uploaded (20)

一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 

Final projet

  • 1. AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION and Mobile Privacy Principles Final projet on Principles of Mobile Privacy courses gsmatraining By : Serge parfait Goma
  • 2. plan ➢ Context ➢ What are we talking about ? ➢ What is mobile privacy principles ? ➢ What is african union convention on cspdp ? ➢ mobile privacy principles vs african union convention on cspdp ➢ Analyse ➢ Challenges ➢ Suggestion ➢ references
  • 3. A single profil can include more 1500 data point (a person sexuality, browers history, political affliation, medical records. Ex : acxiom claim to have 10 % of world people datas is not only business in 2013 snowden show that vast regime of mass governement surveillance programmes . context In digital age, data play a huge role in our every day life is presenting in various way example: online shoping you have to type your name, email addres, address, but data collecting can also be less visible than this exemple
  • 4. what are we talking about ?? ● privacy ? The article 12 of the unversal declaration of Human rights say: no one shall be subjected to arbitrary interference with privacy ,family, home or correspondence everyone has the right the protection of the law against such interference or attacks Data protection Data protection is not the same thing as privacy, privacy is a broad concept refering to the condition with enablyng basic fundation of human dignity and autonomy data protection is more specific it concerns in te way campany and third parties handle confidential information of constumer data Protection ? Data protection
  • 5. What is mobile privacy principles ? These principles were developed in 2011 and describe the way in which mobile consumers’ privacy should be respected and protected when consumers use mobile applications and services that access, use or collect their personal information. based on recognised and internationally accepted principles on privacy and data protection. The key overarching objective of these principles is to foster business practices and standards that deliver meaningful transparency, notice, choice and control for mobile users with regards to their personal information and the safeguarding of their privacy. The GSMA represents the interests of mobile operators worldwide, uniting nearly 800 operators with more than 250 companies in the broader mobile ecosystem,including handset and device makers, software companies,equipment providers and internet companies,as well as organisations in adjacent industry sectors. The GSMA also produces industry- leading events such as Mobile World Congress, Mobile World Congress Shanghai and the Mobile 360 Series conferences. I Overview on GSMA II III
  • 6. What is AFRICAN UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA PROTECTION ? Our work will focus on the aspect of personal data protection This an establishment of a regulatory framework on cyber-security and personal data protection takes into account the requirements of respect for the rights of citizens, guaranteed under the fundamental texts of domestic law and protected by international human rights Conventions and Treaties, particularly the African Charter on Human and Peoples' Rights; I II The AU CCSPDP is a Legal Framework for Cyber-security and Personal Data Protection embodies the existing commitments of African Union Member States at sub-regional, regional and international levels to build the Information Society. Is aims at defining the objectives and broad orientations of the Information Society in Africa and strengthening existing legislations on Information and Communication Technologies (ICTs) of Member States and the Regional Economic Communities (RECs); This an establishment of a regulatory framework on cyber-security and personal data protection takes into account the requirements of respect for the rights of citizens, guaranteed under the fundamental texts of domestic law and protected by international human rights Conventions and Treaties, particularly the African Charter on Human and Peoples' Rights; Our focus
  • 7. High level privacy principles AU convention on cyber security and personal data protection 1 Openness, Transparency and Notice Responsible persons shall be open and honest with users and will ensure users are provided with clear, prominent and timely information regarding their identity and data privacy practices. Users shall be provided with information about persons collecting personal information about them, the purposes of an application or service, and about the access, collection, sharing and further use of a users’ persona information, including to whom their personal information may be disclosed, enabling users to make informed decisions about whether to use a mobile application or service 3 Purpose and Use The access, collection, sharing, disclosure and further use of users’ personal information shall be limited to meeting legitimate business purposes, such as providing applications or services as requested by users, or to otherwise meet legal obligations. 5User Choice and Control Users shall be given opportunities to exercise meaningful choice, and control over their personal information Articles 13 Principle 5: Principle of transparency of personal data processing The principle of transparency requires mandatory disclosure of information on personal data by the data controller. 2 Articles 13 Principle 3: Principle of purpose, relevance and storage of processed personaldata a) Data collection shall be undertaken for specific, explicit and legitimate purposes, and not further processed in a way incompatible with those purposes; b) Data collection shall be adequate, relevant and not excessive in relation to the purposes for which they are collected and further processed; 4 Articles 17 Right of access Article 18: Right to object Articles 19 :Right of rectification or erasure 6
  • 8. High level privacy principles AU convention on cyber security and personal data protection 7Data Minimisation and Retention Only the minimum personal information necessary to meet legitimate business purposes and to deliver, provision, maintain or develop applications and services should be collected and otherwise accessed and used. Personal information must not be kept for longer than is necessary for those legitimate business purposes or to meet legal obligations and should subsequently be deleted or rendered anonymous 9Respect User Rights Users should be provided with information about, and an easy means to exercise, their rights over the use of their personal information. 8 Articles 13 Principle 3: Principle of purpose, relevance and storage of processed personaldata a) Data collection shall be undertaken for specific, explicit and legitimate purposes, and not further processed in a way incompatible with those purposes;… Article 22: Storage obligations Personal data shall be kept for no longer than is necessary for the purposes for which the data were collected or processed 10 Article 16: Right to information The data controller shall provide the natural person whose data are to be processed with the following information, no later than the time when the data are collected, and regardless of the means and facilities used, with the following information:
  • 9. High level privacy principles AU convention on cyber security and personal data protection 11Security Personal information must be protected, using reasonable safeguards appropriate to the sensitivity of the information. 12 Article 21: Security obligations The data controller must take all appropriate precautions, according to the nature of the data, and in particular, to prevent such data from being altered or destroyed, or accessed by unauthorized third parties Principle 6: Principle of confidentiality and security of personal data processing a) Personal data shall be processed confidentially and protected, in particular where the processing involves transmission of the data over a network;
  • 10. analyse ● We notice that they are same of important and specifics principles and aspect of mobile privacy principles are missing in the personal data protection convention of african union, ● those relevent point are not specificaly notice in the « chapter II : personal data protection » we can list same principles and aspects like : – Children and Adolescents – Education – Accountability and Enforcement : – Code and standards « concept of privacy by design »
  • 11. Challenges They still a lot to do regarding digital laws in africa, privacy and protection is one of the biggest challenge in afrique
  • 12. suggestion ● Make the promotion of african union convention on cyber security and personal data protection. ● Create forum of discussion on the existing convention base on comparaison study. ● Create open and multisteakholder task force to work on update, impact and adaptability from the local legislation to the african union framework ●
  • 13. References ● https://www.gsma.com/publicpolicy/mobile-privacy-principles ● https://au.int/sites/default/files/treaties/29560-treaty-0048_-_african_union_conven tion_on_cyber_security_and_personal_data_protection_e.pdf , ● http://www.mfwa.org/wp-content/uploads/2017/09/brochureMFWA17.pdf ● https://www.youtube.com/watch?v=6vNxslcf9AE ● 05_ecsg_privacyframewk.pdf ● http://www.intuitive- design.co.uk/clients/GSM/Annual_Report_2017/NonFinancial/index.html ● https://www.youtube.com/watch?v=j6fO6JVGGHg