Module 3 - Data Privacy Governance
Module 3 - Data Privacy Governance
John Walu
Summary
Lesson 1: Governance & Management
Lesson 2: Privacy Management - the Privacy Risk
Approach
Lesson 3: Accountability & Documentation
Lesson 4: The Data Protection Officer (DPO) & the
Organisation
Lesson 5: Instituting a Privacy Management
Framework
Lesson 6: How to Be Compliant
Lesson 7: Practical Session
Lesson 1
Examples include:
• sexual preferences, political views, religious
beliefs and activities that occur in both public
and private spaces that are monitored.
• The use of red-light cameras to catch drivers
who commit traffic violations.
• The use of police body cameras.
Privacy Risk Examples
• Privacy of Communication
This privacy category involves protection of the
ways in which individuals communicate with others
using communication any type of communication
media (printed, voice, visual and digital), for
example, postal mail, telephone conversations,
email and videoconferencing. Examples of privacy
issues include:
• The use of communications interception tools,
such as hidden microphones, and tools that
copy communications, such as email and text
messages.
Privacy Risk Examples
- A government collecting information about the
activities of citizens without letting them know
such surveillance occurs.
• Privacy of Data and Image
This privacy category covers the protection of
personal information in all forms, including data,
printed information, and images. Activities within
this category are concerned with establishing rules
that govern the collection, use, sharing and
handling of personal information.
Enterprises commonly consider this category to
have privacy implications involving protecting
specific information items.
Privacy Risk Examples
https://www.odpc.go.ke/data-subjects/#rights
Data Breach Risks
• Any personal data breach can fall into one or
more of the following categories:
Impact of Data Breaches
Communicating Data Breaches
• Breaches can cause significant damage to those
individuals whose personal data has been
compromised. For this reason, data controllers
are required by law to take action when a
personal data breach has occurred.
• The data controller should report personal data
breaches to the supervisory authority as soon as
possible and, where possible, within 72 hours.
• Notification to the Data Commissioner is
triggered where a breach is likely to result in a
risk to the rights and freedoms of individuals.
Communicating Data Breaches
• The level of risk associated with any personal
data breach will therefore need to be assessed
on a case-by-case basis and a decision reached
about (i) notifying the supervisory authority and
(ii) communicating with the data subjects.
Lesson 3
How To Be Compliant
How to be Compliant &
Documentation
• Explain some of the documentation for data
protection.
• Design documentation required for their
organisation’s data protection.
• Examples of documentation- Data records,
security documentation, DP plan, DPIA report etc.
• Data Privacy & Protection By Design
– Create inventory of Data Processes & their
Life Cycle.
– Evaluate existing data processing system to
establish the extent (or not) that they meet
the Key Principles (Consent, Purpose, Data
Minimization etc).
– Undertake Data Protection Impact
How to Be Compliant
• Appoint Data Protection Officers/ Function.
• Take note of Clause on Automated Processing &
Data Transfers.
• Take note of Breach Notifications (within 72hrs).
How to be Compliant: Key Steps
• Management. The Enterprise shall define,
document, communicate, and assigns
accountability for its privacy policies and
procedures.
• Privacy Notice. The Enterprise shall provide
notice about its privacy policies and procedures
and identify the purposes for which personal
information is collected, used, retained, and
disclosed.
• Choice and consent. The Enterprise shall
describe the choices available to the individual
and obtain implicit or explicit consent with
97
respect to the collection, use, and disclosure of
How to be Compliant: Key Steps
• Collection. The Enterprise shall collect personal
information only for the purposes identified in
the notice.
• Data Min/Use and disposal. The Enterprise
shall limit the use of personal information to the
purposes identified in the notice and for which
the individual has provided implicit or explicit
consent.
• Retention Policies: The Enterprise shall
retain personal information for only as long as
necessary to fulfill the stated purposes or as
required by law or regulations and thereafter
appropriately disposes of such information.
How to be Compliant: Key Steps
• Access. The Enterprise shall provide individuals
with access to their personal information for
review and update.
• Disclosure to third parties. The Enterprise
shall disclose personal information to third
parties only for the purposes identified in the
notice and with the implicit or explicit consent of
the individual.
• Security for privacy. The Enterprise shall
protect personal information against
unauthorized access (both physical and logical).
How to be Compliant: Key Steps
• Quality. The Enterprise shall maintain accurate,
complete, and relevant personal information for
the purposes identified in the notice.
• Monitoring and enforcement. The Enterprise
shall monitor compliance with its privacy policies
and procedures and institute procedures to
address privacy related complaints and disputes.
How to be Compliant: Minimum
Baseline 5-Point Action Plan
101
Sample Privacy Program Metrics
Sample Privacy Program Metrics
Maturity Model/ Rating Scale (ISO
15504)
104
Data Protection Impact
Assessment (DPIA)
A Data Protection Impact Assessment (DPIA), also
known as a Privacy Impact Assessment, aims is to
identify the potential privacy risks of new or
redesigned programs, systems or products.
The Law provides some circumstances where a DPIA
would be mandatory. For example:
• (a) processing that involves automated decision
making that produces a significant effect on data
subjects;
• (b) systematic monitoring of data subjects in a
publicly accessible area; or
• (c) large scale processing of sensitive data
(special categories of data and data regarding
criminal offences).
Sample Data Protection Impact
Assessments
Sample Privacy Policy: Typical
Content
• Identity and contact information of the controller;
• Where personal data is not collected from the
individual, the source and nature of that data;
• The purposes of the processing;
• The legal bases for the processing, including
details of applicable legitimate interests;
• The recipients or categories of recipients of the
personal data;
• Details of international transfers of personal data
that require legal protections, and details of
those protections;
107
Sample Privacy Policy: Typical
Content
• The periods for which the personal data will be
stored, or at least the criteria used to determine
those periods;
• Individuals' legal rights with respect to their
personal data;
• Whether the provision of personal data is a legal
requirement;
• The existence of automated decision-making,
including profiling (if any).
108
Practical Session
Practical Session
Practical Session
Typical Privacy Activities/
Challenges
• How to do Data Mapping/Privacy Impact
Assessments:
– Data Transfer/Location, Privacy Risk Profiles.
– Personal data is stored and Processed On-Site
and In-Cloud IT infrastructure.
• How to Realign the internal workflows to comply:
– Consent Management, Data Subject Request,
Incident/ Breach Management.
• How to Realign existing policies to comply
– Data Protection/ Privacy Policy, Data Processor
Agreements, Cookie Policies, Incident-Breach
Policies, Data Retention Policies, etc.
112
Typical Privacy Activities/
Challenges
• Compliance costs in terms of readiness & re-
engineering data processes maybe high to most
organisations
• Poor understanding of data protection regime
– Capacity Building Required For Stakeholders:
Data Controllers/ Data Processors/ Data
Subjects.
113
FB Compliance - Example
114
Google Compliance - Example
115
Twitter Compliance - Example
116
FB Privacy Policy - Example
117
Sample Incident Reporting Form
Sample Incident Register
Sample Incident Management
Dashboard
Sample Cookie Settings
Sample Consent Management
Dashboard
Sample Data Subject Request
Sample Data Mapping Dashboard
Exercise (Introduction to Data
Mapping)
Under each of your functional domains, identify
processes that capture the following personal data:
• Sales & Marketing,
• Finance
• HR
• ICT
• Legal,
• Customer Care, etc.
125
Exercise (Introduction to Data
Mapping)
Then show how each of the process addresses the
following data subject rights:
○ Purpose of process
○ How consent is captured
○ Which data is collected
○ Where it is kept (location)
○ Who can access it
○ How it is updated
○ Its retention period.
References
• Kenya Data Protection Act 2019
• WP 248, Article 29 Data Protection Working Party
• ISACA Privacy Standards/Principles
• ISO Standards
• OECD Standards