Nigerian Data Protection Regulation - Training On Compliance Pre-Requisite
Nigerian Data Protection Regulation - Training On Compliance Pre-Requisite
Compliance Pre-requisite
March, 2020
Sensitivity: Internal
Personal Data Protection:
10100110100100001
Name & image 010100111101110110 Academic Records
11011010101000011
10010101100101010
01110101000101010
00101101011011011
01000101011100010
Email address
Credit Card Details 10100010100010111
Personal Data 01011000100110100
means any information 11010010000101010
relating to an identified or 011110111011011011
identifiable individual 01010100001110010
(data subject). 10110010101001110
Social Media
handle/account
10100010101000101 Car Number
10
10100110100100001
010100111101110110
11011010101000011
10010101100101010
Phone Number &
Home Address 01110101000101010
SMS
00101101011011011
01000101011100010
3 10100010100010111
01011000100110100
[Add disclaimer text in slide master mode] 11010010000101010
Sensitivity: Internal
Sensitive Personal Data:
1010011010010000
10101001111011101
Trade-union
membership
10110110101010000
Political opinion or
11100101011001010 philosophical beliefs
10011101010001010
10001011010110110
Sensitive Personal Data are 11010001010111000
personal data revealing racial or 1010100010100010
Medical 11101011000100110 Your Sexual Ori-
ethnic origin, political opinion, Records entation
1001101001000010
religious or philosophical 10100111101110110
believes, trade-union membership; 11011010101000011
data concerning health or sex life, 1001010110010101
genetic data or biometric data. 00111010100010101
Biometric
0001011010110110 Genetic Data
(e.g. Finger
print) 1010011010010000
10101001111011101
10110110101010000
11100101011001010
10011101010001010
10001011010110110
4
11010001010111000
[Add disclaimer text in slide master mode]
1010100010100010
Sensitivity: Internal
5 Key Business Disruptors in the Telecommunications Industry
Social Media
Regulation
Customer
Personal Data & Demand and Globalisation
Technology Preference
Europe Asia
Robust data Strong but
protection laws fragmented
Africa America
Data protection is at Very Strong but
its infancy. vertically focused
federal privacy
laws
01 Europe
02 Africa
03 Asia
04 America
• General Data Protection Regulation • AU Convention on Cybersecurity and Data Protection. • Singapore - Personal Data Protect Act 2012 • No central federal level privacy law, like the EU’s
(GDPR). • ECOWAS Data Protection Act 2010 • South Korea - Personal Information Protection Law GDPR. But there are several vertically-focused
• Nigeria – Nigerian Data Protection Regulation • China – No single data protection law, rules are found in federal privacy laws,
• South Africa – Protection of Personal Information Act various legislations • There are also new generation of consumer-oriented
6 2013 privacy laws coming from the states. E.g. the
California Consumer Privacy Law (CCPL).
[Add disclaimer text in slide master mode]
Sensitivity: Internal
Data Protection: Fines & Risk
Objectives
Improves Busi-
Data Privacy and Protec- ness Environ-
tion ment Detailed Objectives of the NDPR
Scope
All Personal
The Regulation applies to natural persons residing in Private & Public
Data
Sector
Nigeria or residing outside Nigeria who are citizens of
Nigeria
Very High • Banks, Telcos, CBN, PFC/PFA, Big insurance companies etc.
Statutory Fines
Right of
withdrawal Specific
. Conditions of a
valid consent
Silence/Acquiescence is not the
same thing as consent. If a data
subject says nothing when given
the opportunity to object, or Demonstrable Distinguishable
fails to opt-out or unsubscribe,
will not amount to valid
consent. Informed
12
13
01 0 04 05
Right of
Access 03 2
Right of
Rectification
Right to be
Forgotten
Right to
Restrict
06
Right of Data
Portability
Right to Object
Processing
Processing
For information about Data subjects have the If the continued Meaning that the data Receive in a structured, Where the basis of the
purpose of the right to rectification of processing of those data may only be held by the commonly used, processing is public
processing, categories of inaccurate personal data. is not justified, the data controller, and may machine-readable interest or legitimate
data processed, period subject can withdraw only be used for limited format that supports interest of the
for which the data consent and demand purposes. Where data re-use, transfer or controller. Data subject
would be stored, the erasure of their data. subject cannot demand transmitted from can also object
sources of the data. erasure. controller to another, processing for direct
(charged fees in some store it. marketing purposes.
instances
14
07 0 0 1
Right to be
Right to
Communicate
8
Right to be
informed about
9
Right Right of
information relating to 0
informed about
reasons of delay
or non- Right
processing of data on
Right
Erasure all rights request . provision of
information.
For information about Data subjects have the right to For all information relating Where there is delay in in
purpose of the processing, rectification of inaccurate processing (any form of the provision of Where t
categories of data personal data. processing) information to theReceive
data
processed, period for which subject, the data subject
the data would be stored, has right to be informed
the sources of the data. about reason for the delay.
(charged fees in some
instances
15
16
Impact Assessments
Data Protection by Design Where a new processing activity is proposed (especially where new
Incorporate safeguards both in the planning & implementation technologies will be used) resulting in a high degree of risk for data
phases of processing activities of any new product or service. subjects
03 - PROPORTIONATE 07 - SECURITY
Personal data must be protonate, relevant and Appropriate technical and organizational
not excessive. measures must be established to protect the
data.
04 - ACCURATE 08 - TRANSFER
Personal data must be accurate and where Personal data must not be transferred outside
necessary kept up to date. territorial jurisdiction unless adequate
18 provisions are in place.
19
Employees’ records
This include the performance scores, line
manager’s comment etc.
20
21
22
23
Processing and Use personal data only for the purpose and time specified by the user, process it lawfully & fairly.
Storing Personal
Data Mask, encrypt, and anonymize all Personally Identifiable Information (PII) , depending on their exact usage and
storage state
Collect and process all personal data only after obtaining explicit consent, where there is no statutory or contractual
User Consent basis for collection.
Redesign processes linked to VAS and other data monetization strategies, in line with the user consent mandate
REQUIREMENT SOLUTIONS
Conduct a vulnerability assessment and penetration testing (VAPT) for all applications, and chalk out a business
continuity plan (BCP) for each one.
Conduct data protection impact assessments to identify risks to users, and also detail how such risks will be
mitigated
Impact assessments
Roll out an extensive compliance audit program for robust risk management
Data protection Appoint a DPO to oversee the data security strategy and NDPR compliance (and other local laws)
officers (DPO
Maintain record of processing activities and prepare records of processing as a part of the NDPR assessment report.
25
Records of processing
[Add disclaimer text in slide master mode]
Sensitivity: Internal
Personal Data Protection Humour
26
Sensitivity: Internal