SlideShare a Scribd company logo
1 of 8
Mobile Privacy in Zambia
Presentation by
Francisca Kabaso
Principles of Mobile Privacy
Outline of Presentation
• Introduction
• Definition of Privacy
• Privacy, Security and Data Protection- Are they
the same thing?
• What is the role of government and the ICT
Regulator?
• Conclusion
• References
Definition of Privacy
Article 32 (d) and (e) of
the Constitution of
Zambia highlights the
protection of citizens,
including personal
information and
communication.
UNDG defines privacy as ‘the
presumption that individuals should
have an area of autonomous
development, interaction and
liberty. A private sphere with or
without interaction with others, free
from state intervention and from
excessive unsolicited intervention by
other individuals.’
Universal Declaration of
Human Rights 1948
defines privacy as ‘the
right to the protection
of an individual against
intrusion into their
private sphere’
The Convention on the Rights of
theChild underArticle 16 deals
with privacy in relation to children.
Article 16 of theCRC states, ‘No
child shall be subjected to arbitrary
or unlawful interference with his or
her privacy, family or
correspondence, nor to unlawful
attacks on his or her honour and
reputation’.
PRIVACY
Privacy , Data Protection and Security – are they the
same thing?
 Privacy and Security are not the same even though they are
sometimes used interchangeably.
 Consumers have the responsibility to ensure that they keep their
personal information private and/or restricting access to others.
However, the challenge comes in when it comes to ensuring
privacy on mobile and online platforms.
 When it comes to an online platform, consumers have little or no
control on who their personal data is shared with and this can be
a risk to one’s privacy. This is where issues of security and data
protection comes in.
 Services providers have the responsibility to ensure that they
collect personal data only when the consumer has provided
consent. Further, all necessary efforts should be made by service
providers to ensure the data collected is used for its intended
purpose.
 Service providers also have the responsibility to ensure that
consumer personal data is well secured and protected from theft
or access by unauthorised persons.
government?
ICT Regulator
• Embark interventions to
sensitize and raise awareness
amongst consumers on issues
of privacy, security and data
protection
• Continue to actively enforce
provisions of the Electronic
Communications and
Transactions Act No.21 of 2009
relating to data protection
• Work with Mobile Network
Operators to ensure privacy
settings/conditions are
simplified and made easy to
understand for consumers
Government
• Adoption of a National
Data Protection Act
• Nomination of a national
institution that can
oversee and handle data
protection matters
Do consumers not have a role in all this?
They definitely do! Consumers must take
all the necessary steps within their
boundaries to ensure the privacy of their
information before all other parties come
in.
Conclusion
Mobile privacy remains a key issue of concern not just for
consumers, but for network and service providers, regulators as
well as governments. All relevant parties need to be on board to
ensure a well secured cyber environment for citizens.
References
1. UN Convention on the Rights of the Child (UNCRC) found at
https://www.unicef.org/crc/
2. UNDG Big Data Guidance note found at https://undg.org/wp-
content/uploads/2017/03/UNDG-Big-Data-Guidance-Note.pdf
3. Report of the Special Rapporteur on the promotion and
protection of the right to freedom of opinion and expression,
Frank La Rue* found at
http://www.ohchr.org/Documents/HRBodies/HRCouncil/Regular
Session/Session23/A.HRC.23.40_EN.pdf
4. https://www.unicef.org/csr/files/UNICEF_CRB_Digital_World_Se
ries_PRIVACY.pdf
5. Electronic Communications and Transactions Act No. 21 of 2009
found at www.zicta.zm
Thank You!

More Related Content

What's hot

Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
FOTIOS ZYGOULIS
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
E-Journal ICT4D
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
bueno buono good
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
Adriana Dvorsak
 
Legislation in the creative media industry
Legislation in the creative media industryLegislation in the creative media industry
Legislation in the creative media industry
k_ishii_
 
Laws of interest to security professionals
Laws of interest to security professionalsLaws of interest to security professionals
Laws of interest to security professionals
Shivani Gamit
 

What's hot (20)

At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Anti Trafficking - The Rules
Anti Trafficking - The RulesAnti Trafficking - The Rules
Anti Trafficking - The Rules
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Immigrants in Detention
Immigrants in DetentionImmigrants in Detention
Immigrants in Detention
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Media legislation
Media legislationMedia legislation
Media legislation
 
Cr4 tpp aucklan2012_edit
Cr4 tpp aucklan2012_editCr4 tpp aucklan2012_edit
Cr4 tpp aucklan2012_edit
 
Legislation in the creative media industry
Legislation in the creative media industryLegislation in the creative media industry
Legislation in the creative media industry
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Russia and cybercrime
Russia and cybercrimeRussia and cybercrime
Russia and cybercrime
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new norm
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Laws of interest to security professionals
Laws of interest to security professionalsLaws of interest to security professionals
Laws of interest to security professionals
 

Similar to Mobile privacy in Zambia

ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptx
LimeJuice5
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
Thomas Müller
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
vitor94
 

Similar to Mobile privacy in Zambia (20)

PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Final projet
Final  projetFinal  projet
Final projet
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptx
 
Digital Citizenship Andrew Cates Anthony Torres Paige Hurley
Digital Citizenship Andrew Cates Anthony Torres Paige HurleyDigital Citizenship Andrew Cates Anthony Torres Paige Hurley
Digital Citizenship Andrew Cates Anthony Torres Paige Hurley
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
ETECH_G2.pdf
ETECH_G2.pdfETECH_G2.pdf
ETECH_G2.pdf
 

Recently uploaded

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
AS
 

Recently uploaded (9)

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Abortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddahAbortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddah
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureBromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
 
Mobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android InstallationMobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android Installation
 

Mobile privacy in Zambia

  • 1. Mobile Privacy in Zambia Presentation by Francisca Kabaso Principles of Mobile Privacy
  • 2. Outline of Presentation • Introduction • Definition of Privacy • Privacy, Security and Data Protection- Are they the same thing? • What is the role of government and the ICT Regulator? • Conclusion • References
  • 3. Definition of Privacy Article 32 (d) and (e) of the Constitution of Zambia highlights the protection of citizens, including personal information and communication. UNDG defines privacy as ‘the presumption that individuals should have an area of autonomous development, interaction and liberty. A private sphere with or without interaction with others, free from state intervention and from excessive unsolicited intervention by other individuals.’ Universal Declaration of Human Rights 1948 defines privacy as ‘the right to the protection of an individual against intrusion into their private sphere’ The Convention on the Rights of theChild underArticle 16 deals with privacy in relation to children. Article 16 of theCRC states, ‘No child shall be subjected to arbitrary or unlawful interference with his or her privacy, family or correspondence, nor to unlawful attacks on his or her honour and reputation’. PRIVACY
  • 4. Privacy , Data Protection and Security – are they the same thing?  Privacy and Security are not the same even though they are sometimes used interchangeably.  Consumers have the responsibility to ensure that they keep their personal information private and/or restricting access to others. However, the challenge comes in when it comes to ensuring privacy on mobile and online platforms.  When it comes to an online platform, consumers have little or no control on who their personal data is shared with and this can be a risk to one’s privacy. This is where issues of security and data protection comes in.  Services providers have the responsibility to ensure that they collect personal data only when the consumer has provided consent. Further, all necessary efforts should be made by service providers to ensure the data collected is used for its intended purpose.  Service providers also have the responsibility to ensure that consumer personal data is well secured and protected from theft or access by unauthorised persons.
  • 5. government? ICT Regulator • Embark interventions to sensitize and raise awareness amongst consumers on issues of privacy, security and data protection • Continue to actively enforce provisions of the Electronic Communications and Transactions Act No.21 of 2009 relating to data protection • Work with Mobile Network Operators to ensure privacy settings/conditions are simplified and made easy to understand for consumers Government • Adoption of a National Data Protection Act • Nomination of a national institution that can oversee and handle data protection matters Do consumers not have a role in all this? They definitely do! Consumers must take all the necessary steps within their boundaries to ensure the privacy of their information before all other parties come in.
  • 6. Conclusion Mobile privacy remains a key issue of concern not just for consumers, but for network and service providers, regulators as well as governments. All relevant parties need to be on board to ensure a well secured cyber environment for citizens.
  • 7. References 1. UN Convention on the Rights of the Child (UNCRC) found at https://www.unicef.org/crc/ 2. UNDG Big Data Guidance note found at https://undg.org/wp- content/uploads/2017/03/UNDG-Big-Data-Guidance-Note.pdf 3. Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue* found at http://www.ohchr.org/Documents/HRBodies/HRCouncil/Regular Session/Session23/A.HRC.23.40_EN.pdf 4. https://www.unicef.org/csr/files/UNICEF_CRB_Digital_World_Se ries_PRIVACY.pdf 5. Electronic Communications and Transactions Act No. 21 of 2009 found at www.zicta.zm