L - E3 (Entire Set) Privacy
L - E3 (Entire Set) Privacy
Privacy
◻ The right and ability of individuals to control
their personal information and decide how and
when it is collected, used, and shared within the
framework of legal and cultural norms.
◻ Privacy is a significant topic within the realm of
Personal Data vs Sensitive Personal Data Personal Data vs Sensitive Personal Data
◻ Personal data: any piece of information that ◻ Sensitive personal data aka as special category
someone can use to identify, with some degree data: a specific set of “special categories” that must
of accuracy, a living person. be treated with extra security.
◻ It is a subset of personal data that requires higher
e.g., name, address, phone number, email
levels of protection due to the potential harm if
address, date of birth, financial details, and exposed.
information related to work, education and ◻ Includes highly confidential information that, if
hobbies. mishandled, could cause significant damage e.g.:
◻ Personal data is also classed as anything that racial or ethnic origin; data related to a person’s
can affirm your physical presence somewhere. sex life or sexual orientation; and biometric data
(where processed to uniquely identify someone).
1
10/24/2023
◻ We want to keep some (if not all) areas of When data was stored in paper form it
our lives private. was that much harder to work with.
◻ It is our right to do so.
Today, massive amounts of data can be
◻ Though…
stored, accessed or moved/transferred at
There seems to be a difference in how much
we value our privacy, depending on which the click of a button.
generation we belong to. Two areas of law become of interest:
■Social media generation Data protection
■However, too, loyalty cards
Freedom of information ...
2
10/24/2023
3
10/24/2023
◻ Other major concerns due to the ◻ Other major concerns due to the proliferation of the
internet:
proliferation of the internet: ◻ Social Media Privacy
4
10/24/2023
5
10/24/2023
Mass surveillance
Scope creep mass surveillance
The Panopticon
Mass Surveillance
◻ The Panopticon
◻ La te 1 8th Cen tury idea by Jer emy B ent ha m (En gli sh
philosopher and social theorist).
One invisible warden in a central tower watches many
individuals separated from each other.
To help manage correctional facilities by inducing good
behaviour
■ the more people are watched, the better they behave.
■ the prisoners do not know who is being watched, thus
they modify their behaviour accordingly.
◻ Inspired George Orwell’s big brother’s all seeing eye in
Prison San Vittore – Milan (built in 1880)
“1984”. 115
Source: thefunambulist.net
6
10/24/2023
7
10/24/2023
◻ Using phones + the internet to carry out mass surveillance and those with low scores face restrictions.
data mining. ◻ Basically mass surveillance and social control
E.g. based on your internet searches and social networking data.
it involves extensive data collection and monitoring
of citizens' activities.
8
10/24/2023
9
10/24/2023
◻ This would serve as a Proof of Concept. ◻ The High Court in Nairo bi declared this
10
10/24/2023
◻ Argued such a list violated the January 2017, CA announced their plan to
Constitution’s: implement a device management system:
◻ Article 31 Ostensibly to identify fake and stolen devices.
the right to privacy In reality: a spy system to monitor digital
◻ Article 53(2) communications:
the "child’s best interests are of paramount a third party (a foreign firm) connects to mobile
importance in every matter concerning the service providers’ routers
child." To snoop on private communication data
SMS, call and mobile money transfer data.
11
10/24/2023
Surveillance Activities
Data Processing vs Privacy
Other Examples: Huduma Number
Once more, massive amounts of personal ◻ The constitution enshrines our right to
data was being collected, centralised and privacy.
shared. ◻ But pre-November, 2019 there was
YET!... no law to specifically give it effect.
Kenya had yet to adopt data protection ◻ No dat a pro te ct i on l aw an
legislation around these activities. individual’s personal information can
The project lacked adequate data be abused by those that obtain it.
protection measures and oversight.
12
10/24/2023
◻ The Kenyan Data Protection Bill ◻ Yet all this data about an individual
(2019) was the latest version. stored in one database.
◻ At long last (November 8, 2019) the ◻ The problem being there was no law
Surveillance Activities
Other Examples: Huduma Number (cont) … India
◻ Also: ◻The Aadhaar number was initially
◻ Is the practice and spirit of it such
initiatives as the Huduma No. from a
publicised as a voluntary service.
genuine place? ◻However citizens without this
◻ If we are not to find this system number were denied certain
suspect, we must be assured that the crucial services
government has our interests at heart. E.g.collection of payments for those
◻ cf the Aadhar Number…
on welfare.
13
10/24/2023
14
10/24/2023
15
10/24/2023
16
10/24/2023
◻ Information is a priceless commodity that ◻ Big data firms seem to have more power than
we give out for free. governments.
◻ Governments want to regain their power
◻ Why not sell it?
◻ A country may have exponential growth in e-
Watch Stuart Lacey’s TEDxBermuda talk commerce (as Kenya does).
titled: “The Future of Your Personal Data - Manycitizens run their businesses on FB, Instagram,
Privacy vs Monetization” e-commerce platforms like Jumia and Amazon.
https://www.youtube.com/watch?v=JIo- ◻ No legislation to protect data means people’s
V0beaBw sensitive data is online but unprotected.
17
10/24/2023
Legal
Ethical
Human rights
Data Protection
Legal Issues
18
10/24/2023
◻ When you opt in, one of the T&Cs is: ◻ How and why did private entities have access
You allow them access to the information the to such potent data?
Integrated Population Registration System ◻ B e c au se t he r e wa s no l e ga l f r am e w o r k
19
10/24/2023
Data Protection
Ethical Issues
collection?
Is the passing of amendments to certain laws
done with transparency / accountability /
integrity in mind?
20
10/24/2023
◻How ethical are the following: How ethical are the following:
Treating humans as their data (am I my data)?
◻The state having considerable
“ok” and profitable for businesses but…
insight into our lives? … governments actions should not be driven by
commercial interests/profit margins
◻ The state enabling others (private
Cambridge Analytica – data used to breach
corporations/individuals) to have the democracy of at least two developed
insight into our lives nations.
e.g. through security breaches)? How sovereign are we?
Data Protection
Human Rights Issues
Right to privacy
Data Protection
The state/its official organs having massive
Human Rights Issues amounts of data can be dangerous
Your information can be weaponised
E.g. genocide is made easy…
Marginalisation (resource allocation)
Wrong profiling – you are of religion X
therefore you are a terrorist
(automated decision making)
21
10/24/2023
Right to privacy
◻
p o l i t i c a l S M S s s e n t t o y o u r “ p r i v a t e ”
cellphone number
22
10/24/2023
23
10/24/2023
Mass surveillance implies data on individuals When individuals are under constant surveillance, there
is generated, collected and processe d may be a presumption of guilt or suspicion, shifting the
burden of proof from the prosecution to the defense.
r egar dle ss o f thei r be ing invo lve d (o r
Mass surveillance can create an environment where
suspected to be involved) in criminal activities. individuals are treated as potential suspects until they
This “distorts the burden of proof principles, can prove their innocence.
leads to an unaccountable increase in power, This chilling effect on freedom of expression
and has a chilling effect on individual action Knowing that they are being monitored, individuals
and the exercise of free speech.” may self-censor their online activities and
communications out of fear of being targeted or
(Kiprono, 2018) ... labeled as a potential threat.
24
10/24/2023
What should a DPL look like? What should a DPL look like?
25
10/24/2023
Players Players
controller,
■the purpose for which personal data is
collects
personal data
collected and processed
processes this data
■the means and method of processing it ◻ Does not own or control the data they process
◻ i.e., dictates how and why data is going to They can’t change the purpose and the means in
be used by the organisation. which the data is used.
They are bound by the instructions given by the
data controller.
26
10/24/2023
Players Players
◻ Basically, a data controller determines why and ◻ Example (cont...):
how personal data should be processed while
◻ a data processor carries out these tasks on behalf of
◻ The uni is the data controller and
the controller. ◻ The security firm is the data processor.
◻ Example: ◻ The uni could also act as both when
◻ Say the university has hired a security firm.
collecting other data
◻ The uni determines what information is to be
e.g. student registration data.
gathered at the gate about the students/staff/other
visitors.
27
10/24/2023
◻ The EU has a comprehensive data privacy law known ◻ Severe and designed to be effective, proportionate
as the General Data Protection Regulation (GDPR). and dissuasive for each individual case.
◻ A data subject has rights under the GDPR that aim to ◻ For especially severe violations, listed in Article 83 (5)
protect their privacy and right to self-determination. GDPR, the fine framework can be up to 20 million
◻ The GDPR euros, or up to 4% of the organisation’s total global
enhances individuals’ control and rights over their turnover of the preceding fiscal year, whichever is
personal information higher.
simplifies regulations for international business.
◻ Less severe violations in Article 83 (4) GDPR sets forth
fines of up to 10 million euros, or up to 2% of the
governs the transfer of personal data outside the organisation’s entire global turnover of the preceding
EU and the European Economic Area (EEA). fiscal year, whichever is higher.
28
10/24/2023
29
10/24/2023
◻ The right to privacy is enshrined in Article ◻ Article 2: should Kenya sign/ratify international
31 of the Kenyan constitution: treaties/ conventions they become part of the
Kenyan domestic law.
Every person has the right to privacy. ◻ Kenya is a signatory to
This includes the right not to have the Universal Declaration of Human Rights (UDHR)
■their person, home or property searched; ◻ and has ratified
■their possessions seized;
the International Covenant on Civil and Political
■information relating to their family or private Rights (ICCPR)
affairs unnecessarily required or revealed; or ◻ They include privacy rights.
■the privacy of their communications infringed.
(Kenyan Constitution: Chapter Four, Part 2, Article 31)
30
10/24/2023
31
10/24/2023
32
10/24/2023
◻ Data Controllers and Processors must: Law to safeguard citizens’ personal data.
Sets out comprehensive provisions for the collection,
process data lawfully;
use, storage, and handling of personal data.
minimise collection of data; seeks to promote and protect the privacy of
restrict further processing of data; personal data and ensure that data controllers,
data processors, and data subjects adhere to the
ensure data quality; highest standards of data protection.
e s t a b l i s h a n d m a i n t a i n s e c u r i t y sets out stringent requirements for data controllers
safeguards to protect personal data. on what to do with the personal data they collect...
The Data Protection Act of 2019 The Data Protection Act of 2019
They must provide data subjects with a notice explaining ◻ The Data Protection Act also gives data
how their data will be collected, processed, and stored. subjects the right to access their personal data
They must include details on the purpose of the data held by data controllers.
processing, the legal basis for the data processing, and
◻ Data subjects can request data controllers to
the party to whom the data will be disclosed.
Data controllers must also obtain explicit consent from provide them with a copy of their personal
data subjects before they can process their personal data, and data controllers must respond to
data. these requests within thirty days.
They must ensure that they only collect and process data ◻ Data subjects can also request data controllers
that is necessary for the purpose they seek to achieve. to rectify, delete, or restrict the processing of
their personal data.
33
10/24/2023
The Data Protection Act of 2019 The Data Protection Act of 2019
◻ Data controllers must comply with these requests, except
under specific circumstances set out in the Act. ◻ The act establishes the office of the Data
◻ The Act also provides for the protection of data subjects’ Protection Commissioner, who is
rights against unauthorised processing, loss of data, or
destruction of data. responsible for overseeing and enforcing
◻ Data controllers must take appropriate measures to data protection regulations in Kenya.
safeguard personal data, including measures to prevent
unauthorised access, modification, disclosure, or destruction ◻ The Commissioner has the powe r to
of personal data.
◻ Data controllers must also put in place adequate technical investigate data controllers and
and organisational measures to ensure the security of processors suspected of violating data
personal data.
protection laws and to impose sanctions on
violators of the law.
The Data Protection Act of 2019 The Data Protection Act of 2019
Regulates the processing of personal data You have the right to know how your information
is handled.
and information. You have the right to request your personal data
GDPR principles informed the bill on the be deleted/edited if it is inaccurate.
governance of this information The right to data portability is enforced.
A data subjects can obtain d ata that a da ta
How it is handled, stored and shared. controller holds on them and reuse it for their own
purposes.
Illegal processing of personal data is You now have the right to refuse an organisation to
punishable by law. transfer your personal data to another organisation.
Upto 3,000,000/= fine or a maximum of 2 Should be a relief to cellphone users.
years in jail.
34
10/24/2023
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
◻ All data controllers/data processors must ◻ The following conditions ensure that cross-border data
ensure at least one copy of personal data to processing is carried out with proper safeguards and
which the Act applies is stored on a server or consideration for data subjects' rights and privacy.
data centre located in Kenya 1. Adequate Protection
2. Consent
◻ Cross-border processing of sensitive personal
35
10/24/2023
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
Example:
◻ Legal Obligations: if such transfers ◻
36
10/24/2023
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
◻ Public Interest: if the data transfers are ◻ Legal Claims: Transfers of data may be
necessary for the performance of a task allowed if they are necessary for the
carried out in the public interest or in the establishment, exercise, or defense of legal
claims.
exercise of official authority.
E.g. a law firm processes personal data
e.g., to conduct a public health survey
without consent to pursue a legal claim on
during a disease outbreak. behalf of a client in a court case.
This is done in the public interest to This processing is necessary for the
protect the health of the population. establishment, exercise, or defense of legal
claims ...
37
10/24/2023
38
10/24/2023
roles ...
The Kenyan Data Commissioner’s Roles The Kenyan Data Commissioner’s Roles
39
10/24/2023
The Kenyan Data Commissioner’s Roles The Kenyan Data Commissioner’s Roles
The Kenyan Data Commissioner’s Roles The Kenyan Data Commissioner’s Roles
40
10/24/2023
Case Studies
Data Protection Enforcement Actions in Kenya -
September 2023
41
10/24/2023
42
10/24/2023
43
10/24/2023
◻ Investigating how My AI processes the personal Snapchat has violated British data protection
data of Snapchat's 21 million UK users, laws.
including children aged 13-17. ◻ The ICO is considering the company's response
44
10/24/2023
that their risk assessment procedures align with bodies like the ICO (and our very own
privacy standards. ODPC) in assessing and addressing
◻ If Snapchat does not adequately address its concerns,
potential privacy risks associated with new
My AI could be banned in the UK.
technologies.
45
10/24/2023
◻ Upcoming Compliance Audits: ◻ The Kenya Data Protection Act, 2019 is not a
joke.
◻T h e O D P C p l a n s t o c o n d u c t 4 0
◻ These cases highlight the consequences of non-
compliance audits across various compliance with the KDPA and its associated
sectors during the current financial regulations.
year. ◻ Organisations and institutions that handle
46
10/24/2023
Turns Out “Obvious” Is Relative Copycat behaviour sprouted all over the place.
Data controllers almost immediately struck back with Tribe Onyx Club, Texas Barbeque, and
warnings of implied consent to revellers entering their
premises. Quiver Lounge Kilimani
◻ We appreciate this company’s “proactive” ◻ In other words, it’s nice of them to inform
approach to addressing data protection individuals about the possibility of being
and privacy concerns. photographed, filmed, or recorded.
◻ However. ◻ Such notices MUST however align with the
Procedure and Enforcement) Regulations, enhance the notice's compliance with data
2021 ... protection regulations ...
47
10/24/2023
48
10/24/2023
49
10/24/2023
50
10/24/2023
51
10/24/2023
52
10/24/2023
regulates the collection, dissemination, and ◻ Imposes requirements on websites and online
use of consumer credit informatio n, services that collect personal information from
including credit reports and credit scores. children under the age of 13.
53
10/24/2023
China
54
10/24/2023
55
10/24/2023
Component Manufacturers: The origin of Unclear or Impractical Policies: Policies must be both
components used in devices raises national clear and feasible for effective implementation.
security concerns. Policies written in technical jargon may lead to
misunderstandings.
It's essential to know the source and security
E.g.:
of components used in critical systems.
"Unauthorised individuals attempting to access the system
Ever-Changing Risks: The dynamic nature of will be met with robust countermeasures, including but not
hacking threats necessitates continuous learning. limited to rigorous intrusion detection protocols, real-time
Security professionals must stay updated to threat analysis, and immediate implementation of stringent
counter evolving cybersecurity threats. security measures."
56
10/24/2023
Best Practices in Privacy and Security: Best Practices in Privacy and Security:
57
10/24/2023
Outro Outro
◻ Privacy is a fundamental right that encompasses Balancing technological advancements, legal
various aspects of our lives. obligations, and societal concerns is an ongoing
◻ It is a multifaceted issue with legal, ethical, and social challenge.
dimensions. Balancing the need for privacy with other societal
◻ It's protected by interests, such as security and public safety, is an
laws and ongoing challenge.
ethical principles Organisations must prioritise privacy, adopt best
◻ However, technological advancements and evolving
practices, and adapt to the evolving landscape of
privacy challenges require ongoing attention and data privacy and security.
debate.
58
10/24/2023
Outro Task
325
References
◻ Burgess, M. (2019, February 14). What is GDPR? The summary guide to GDPR
compliance in the UK. Retrieved from https://www.wired.co.uk/article/what-is-gdpr-
uk-eu-legislation-compliance-summary-fines-2018
◻ Kiprono, D.: Right to privacy must be protected. (2018, April 28). Retrieved from
https://www.nation.co.ke/oped/opinion/Why-right-to-privacy-must-be-protected-
in-digital-age/440808-4535004-cd3jnw/
◻ Lex - 31995L0046 - EN. (1995). Retrieved from https://eur-
lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
◻ M a s o n , R . O
https://www.researchgate.net/publication/242705009_Four_Ethical_Issues_of_the_
Information_Age
◻ Privacy International. (2019, January). State of Privacy Kenya. Retrieved April 29,
2019, from https://privacyinternational.org/state-privacy/1005/state-privacy-
kenya
◻ Venezuela: Guaidó calls on people to take to the streets [Audio blog post]. (2019,
A p r i l 3 0 ) . R e t r i e v e d A p r i l 3 0 , 2 0 1 9 , f r o m
https://www.bbc.co.uk/programmes/p077x4xr
59