The document discusses and compares the Mobile Privacy Principles developed by GSMA and the African Union Convention on Cyber Security and Personal Data Protection.
The Mobile Privacy Principles were created in 2011 to describe how mobile users' privacy should be respected and protected when using mobile apps and services that access personal information. The African Union convention establishes a regulatory framework for cybersecurity and personal data protection that respects citizens' rights under domestic and international law.
While there is some overlap between the key principles of openness, purpose limitation, and security in both frameworks, the Mobile Privacy Principles include additional elements around children's privacy, accountability, and privacy by design that are not specifically addressed in the African Union convention. Harmonizing these frameworks to
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
surveys the tradi-tional ethical issues of privacy, security, anonymity and analyzes how these issues are affected by computer technology. Information gathering, databasing, and civil liberties are also discussed.
Data protection law in India is currently facing many problem and resentments due the absence of proper legislative framework. There is an ongoing explosion of cyber crimes on a global scale. The theft and sale of stolen data is happening across vast continents where physical boundaries pose no restriction or seem non-existent in this technological era. India being the largest host of outsourced data processing in the world could become the epicentre of cyber crimes this is mainly due absence of the appropriate legislation
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
surveys the tradi-tional ethical issues of privacy, security, anonymity and analyzes how these issues are affected by computer technology. Information gathering, databasing, and civil liberties are also discussed.
Data protection law in India is currently facing many problem and resentments due the absence of proper legislative framework. There is an ongoing explosion of cyber crimes on a global scale. The theft and sale of stolen data is happening across vast continents where physical boundaries pose no restriction or seem non-existent in this technological era. India being the largest host of outsourced data processing in the world could become the epicentre of cyber crimes this is mainly due absence of the appropriate legislation
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...Nzeih Chukwuemeka
The presentation xrays Nigeria's Data Protection Regulation and its benefits and the state of data protection in Nigeria prior to the enactment of the law.
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
In the shadow of the global pandemic and the associated economic downturn, organizations are focused on cost optimization, which often leads to impulsive decisions to deprioritize compliance with all nonrevenue programs.
Regulators have evolved to adapt with the notable increase in data subject complaints and are getting more serious about organizations that don’t properly protect consumer data. Marriott was hit with a $124 million fine while Equifax agreed to pay a minimum of $575 million for its breach. The US Federal Trade Commission, the US Consumer Financial Protection Bureau (CFPB), and all 50 U.S. states and territories sued over the company’s failure to take “reasonable steps” to secure its sensitive personal data.
Privacy and data protection are enforced by a growing number of regulations around the world and people are actively demanding privacy protection — and legislators are reacting. More than 60 countries have introduced privacy laws in response to citizens’ cry for transparency and control. By 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations, up from 10% today, according to Gartner. There is a convergence of data privacy principles, standards and regulations on a common set of fundamental principles.
The opportunities to use data are growing exponentially, but so too are the business and financial risks as the number of data protection and privacy regulations grows internationally.
Join this webinar to learn more about:
- Trends in modern privacy regulations
- The impact on organizations to protect and use sensitive data
- Data privacy principles
- The impact of General Data Protection Regulation (GDPR) and data transfer between US and EU
- The evolving CCPA, the new PCI DSS version 4 and new international data privacy laws or regulations
- Data privacy best practices, use cases and how to control sensitive personal data throughout the data life cycle
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014UsmanMAmeer
This slide dive into Nigeria Data Protection Act 2014 to understand the right and roles of people that deals with Data, from Data Subject, Data Protection Officer to Data Compliance Officers.
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
Key Discussion Pointers:
1. Introduction to Data Privacy
- What is data privacy
- Privacy laws around the globe
- DPDPA Journey
2. Understanding the New Indian DPDPA 2023
- Objectives
- Principles of DPDPA
- Applicability
- Rights & Duties of Individuals
- Principals
- Legal implications/penalties
3. A practical approach to DPDPA compliance
- Personal data Inventory
- DPIA
- Risk treatment
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation is designed to update the current legislation which was drafted in a time that was in technology terms, prehistoric.
The Data Protection Directive, drafted back in 1995, harks back to a time when data processing was more about filing
cabinets than data rack enclosures. It’s time to evolve.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
1. AFRICAN UNION CONVENTION ON
CYBER SECURITY
AND PERSONAL DATA PROTECTION
and
Mobile Privacy Principles
Final projet on Principles of Mobile Privacy courses gsmatraining
By : Serge parfait Goma
2. plan
➢ Context
➢ What are we talking about ?
➢ What is mobile privacy principles ?
➢ What is african union convention on cspdp ?
➢ mobile privacy principles vs african union
convention on cspdp
➢ Analyse
➢ Challenges
➢ Suggestion
➢ references
3. A single profil can include more
1500 data point (a person
sexuality, browers history, political
affliation, medical records.
Ex :
acxiom claim to have 10 % of
world people datas
is not only business in 2013
snowden show that vast regime
of mass governement surveillance
programmes .
context
In digital age, data play a
huge role in our every day
life is presenting in various
way
example: online shoping you
have to type your name,
email addres, address, but
data collecting can also be
less visible than this
exemple
4. what are we talking about ??
● privacy ?
The article 12 of the unversal
declaration of Human rights
say:
no one shall be subjected to
arbitrary interference with
privacy ,family, home or
correspondence
everyone has the right the
protection of the law against
such interference or attacks
Data protection
Data protection is not the same thing as
privacy, privacy is a broad concept
refering to the condition with enablyng
basic fundation of human dignity and
autonomy
data protection is more specific it
concerns in te way campany and third
parties handle confidential information of
constumer
data
Protection ?
Data protection
5. What is mobile privacy principles ?
These principles were developed in 2011 and
describe the way in which mobile consumers’
privacy should be respected and protected
when consumers use mobile applications and
services that access, use or collect their
personal information.
based on recognised and
internationally accepted principles on privacy and data
protection. The key overarching objective of these
principles is to foster business practices and standards
that deliver meaningful transparency, notice, choice and
control for mobile users with regards to their personal
information and the safeguarding of their privacy.
The GSMA represents the
interests of mobile operators
worldwide, uniting nearly 800
operators with more than 250
companies in the broader
mobile ecosystem,including
handset and device makers,
software
companies,equipment
providers and internet
companies,as well as
organisations in adjacent
industry sectors. The GSMA
also produces industry-
leading events such
as Mobile World Congress,
Mobile World Congress
Shanghai and the Mobile 360
Series conferences.
I
Overview on GSMA
II
III
6. What is AFRICAN UNION CONVENTION ON
CYBER SECURITY AND PERSONAL DATA PROTECTION ?
Our work will focus on the aspect of personal data protection
This an establishment of a regulatory framework on
cyber-security and personal data protection takes into
account the requirements of respect for the rights of
citizens, guaranteed under the fundamental texts of
domestic law and protected by international human rights
Conventions and Treaties, particularly the African Charter
on Human and Peoples' Rights;
I
II
The AU CCSPDP is a Legal
Framework for
Cyber-security and Personal
Data Protection embodies
the existing commitments of
African Union Member
States at sub-regional,
regional and international
levels to build
the Information Society.
Is aims at defining the
objectives and broad
orientations of the
Information Society in Africa
and strengthening existing
legislations on Information
and Communication
Technologies (ICTs) of
Member States and the
Regional Economic
Communities (RECs);
This an establishment of a regulatory framework on
cyber-security and personal data protection takes into
account the requirements of respect for the rights of
citizens, guaranteed under the fundamental texts of
domestic law and protected by international human rights
Conventions and Treaties, particularly the African Charter
on Human and Peoples' Rights;
Our focus
7. High level privacy principles AU convention on cyber security and
personal data protection
1
Openness, Transparency and Notice
Responsible persons shall be open and honest
with users and will ensure users are provided
with clear, prominent and timely information
regarding their identity and data privacy
practices. Users shall be
provided with information about persons
collecting personal information about them, the
purposes of an application or service, and about
the access, collection, sharing and further use of
a users’ persona information, including to whom
their personal information may be disclosed,
enabling users to make informed decisions
about whether to use a mobile application or
service
3
Purpose and Use
The access, collection, sharing, disclosure and
further use of users’ personal information shall
be limited to meeting legitimate business
purposes, such as providing applications or
services as requested by users, or to otherwise
meet legal obligations.
5User Choice and Control
Users shall be given opportunities to
exercise meaningful choice, and control
over their personal information
Articles 13
Principle 5: Principle of transparency of
personal data processing
The principle of transparency requires
mandatory disclosure of information on personal
data by the data controller.
2
Articles 13
Principle 3: Principle of purpose, relevance and storage
of processed personaldata
a) Data collection shall be undertaken for specific, explicit
and legitimate purposes, and not further processed in a way
incompatible with those purposes;
b) Data collection shall be adequate, relevant and not
excessive in relation to the purposes for which they are
collected and further processed;
4
Articles 17 Right of access
Article 18: Right to object
Articles 19 :Right of rectification or
erasure
6
8. High level privacy principles AU convention on cyber security and
personal data protection
7Data Minimisation and Retention
Only the minimum personal information
necessary to meet legitimate business purposes
and to deliver, provision, maintain or develop
applications and services should be collected
and otherwise accessed and used. Personal
information must not be kept for longer than is
necessary for those legitimate business
purposes or to meet legal obligations and should
subsequently be deleted or rendered
anonymous
9Respect User Rights
Users should be provided with
information about, and an easy means
to exercise, their rights
over the use of their personal
information.
8
Articles 13
Principle 3: Principle of purpose, relevance and
storage of processed personaldata
a) Data collection shall be undertaken for specific,
explicit and legitimate purposes, and not further
processed in a way incompatible with those
purposes;…
Article 22:
Storage obligations
Personal data shall be kept for no longer than is
necessary for the purposes for which
the data were collected or processed
10
Article 16:
Right to information
The data controller shall provide the
natural person whose data are to be
processed with the following information,
no later than the time when the data are
collected, and regardless of the means
and facilities used, with the following
information:
9. High level privacy principles AU convention on cyber security and
personal data protection
11Security
Personal information must be
protected, using reasonable safeguards
appropriate to the
sensitivity of the information.
12
Article 21:
Security obligations
The data controller must take all appropriate
precautions, according to the nature of the
data, and in particular, to prevent such data from
being altered or destroyed, or
accessed by unauthorized third parties
Principle 6: Principle of confidentiality and
security of personal data processing
a) Personal data shall be processed
confidentially and protected, in particular
where the processing involves transmission of
the data over a network;
10. analyse
● We notice that they are same of important and specifics
principles and aspect of mobile privacy principles are missing
in the personal data protection convention of african union,
● those relevent point are not specificaly notice in the « chapter
II : personal data protection » we can list same principles and
aspects like :
– Children and Adolescents
– Education
– Accountability and Enforcement :
– Code and standards « concept of privacy by design »
11. Challenges
They still a lot to do regarding
digital laws in africa, privacy
and protection is one of the
biggest challenge in afrique
12. suggestion
● Make the promotion of african union convention on
cyber security and personal data protection.
● Create forum of discussion on the existing
convention base on comparaison study.
● Create open and multisteakholder task force to work
on update, impact and adaptability from the local
legislation to the african union framework
●