HIPSSA Support for Harmonization of the ICT Policies in Sub-Sahara Africa 28/29 August, 2013, Swaziland.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, TRAINING /DATA PROTECTION LAW.
Advertisements

Data Protection & Privacy in the Information Age COMNET – Legal Frameworks for ICTs Malta 2013 Dr Antonio Ghio Dr Jeanine Rizzo.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Meeting with Data Protection Law Stakeholders 02 April 2013 PRESENTATION.
HIPSSAPROJECT Support for Harmonization of the ICT Policies in Sub-Sahara Africa Meeting with Data Protection Law Stakeholders 28/29 th August, 2013 PRESENTATION.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, TRAINING /DATA PROTECTION LAW.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT.
Convention for the protection of individual with regard to automatic processing of personal data “The purpose of this convention is to secure in the territory.
The Data Protection (Jersey) Law 2005.
Data Protection.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Data Protection for Church of Scotland Congregations
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Understanding Privacy An Overview of our Responsibilities.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
Understanding Privacy An Overview of our Responsibilities.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
Personal Data Protection
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Privacy principles Individual written policies
Issues of personal data protection in scientific research
IT Applications Theory Slideshows
Data Protection The Current Regime
General Data Protection Regulation
GDPR Overview Gydeline – October 2017
Data Protection Legislation
GDPR Overview GDPR - General Data Protection Regulations
GDPR Overview Gydeline – October 2017
GDPR Road map to Compliance.
Data Protection & Freedom of Information- An Introduction
Bob Siegel President Privacy Ref, Inc.
GENERAL DATA PROTECTION REGULATION (GDPR)
New Data Protection Legislation
G.D.P.R General Data Protection Regulations
GDPR Overview and Use Cases.
General Data Protection Regulation
Data Protection principles
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Relocation CARNIVAL come one…come all
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
IMPLICATIONS OF GDPR ROBERT BELL.
GDPR Workshop MEU Symposium Prague 2018
Information Handling Research Student Induction Day
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
Data Protection for SDS Employers Alison Johnston Lead Policy Officer (Scotland) Information Commissioner’s Office.
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

HIPSSA Support for Harmonization of the ICT Policies in Sub-Sahara Africa 28/29 August, 2013, Swaziland

Summary of the Content  What is Personal Information? How is it Processed?  What is Sensitive Information?  Who is a Data Subject?  Who is a Data Controller?  Who is a Data Processor?  What are the principles of data protection?  Governing Trans-border flow of personal information

Data Controller “data controller” means a public or private body or any other person which or who, alone or together with others, determines the purpose of and means for processing personal information, regardless of whether or not such data is processed by that party or by a data processor on its behalf, where the purpose and means of processing are determined by or by virtue of an act, decree or ordinance, the controller is the natural person, legal person or public body has been designated as such by or by virtue of that act, decree or ordinance.

Data Controller – Ultimate Responsibility “data processor” refers to a natural person, legal person, or public body which processes personal information for and on behalf of the controller and under the data controller’s instruction, except for the persons who, under the direct authority of the controller, are authorised to process the data; “data protection officer” or “DPO” refers to any individual appointed by the data controller charged with ensuring, in an independent manner, compliance with the obligations provided for in this law; “data controller's representative” or “controller's representative”: refers to any natural person, legal person or public body permanently established on the territory [of the concerned country], who takes the place of the data controller in the accomplishment of the obligations set forth in this law;

Data Controller Continued Organisations that process personal data – data controller or data processor or representative. Data controller – responsible for compliance including security breaches. Contracts – statement that a supplier is acting as a data processor and confirm responsibility of data controller (customer) Unclear Lawyers, accountants and doctors are data controllers Outsourced service providers are data processors.

Defining Personal Information information about an identifiable individual that is recorded in any form, including, without restricting the generality of the foregoing:- information relating to the race, national or ethnic origin, religion, age or marital status of the individual; information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved; any identifying number, symbol or other particular assigned to the individual; the address, fingerprints or blood type of the individual; the name of the individual where it appears with other personal information relating to the individual or where the disclosure of the name itself would reveal information about the individual; correspondence sent to a data controller by the individual that is explicitly or implicitly of a private or confidential nature, and replies to such correspondence that would reveal the contents of the original correspondence; and the views or opinions of any other person about the individual.

Processing of Personal Information processing: refers to any operation or set of operations which is performed upon personal information, whether or not by automated means, such as obtaining, recording or holding the data or carrying out any operation or set of operations on data, including – (a) organization, adaptation or alteration of the data; (b) retrieval, consultation or use of the data; or (c) alignment, combination, blocking, erasure or destruction of the data Limitations on Processing

Sensitive Personal Information “sensitive personal information” (a) refers to genetic data, data related to children, data related to offences, criminal sentences or security measure, biometric data as well as, if they are processed for what they reveal, personal information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, affiliation, trade-union membership, gender and personal information concerning the health or sex life of the individual (b) refers to any personal information otherwise considered by Swaziland law as presenting a major risk to the rights and interests of the data subject, in particular unlawful or arbitrary discrimination.

Case studies Torbay Care Trust in Torquay was fined £175,000 after it published the sensitive details of over 1,000 employees on the Trust’s website. The data covered individuals’ names, Dates of birth, National Insurance numbers, Religion and Sexuality We regularly speak with organizations across the health service to remind them of the need to look after people’s data. The fact that this breach was caused by Torbay Care Trust publishing sensitive information about their staff is extremely troubling and was entirely avoidable. Not only were they giving sensitive information out about their employees but they were also leaving them exposed to the threat of identity fraud.identity fraud Stephen Eckersley, Head of Enforcement

Case studies Australian Privacy Commissioner case Information was disclosed for a purpose other than the primary purpose for which it was collected, and the disclosure was not permitted by any of the exceptions The Commissioner formed the view that the disclosure was an interference with the complainant's privacy Conciliation and Settlement

What happened to the News of the World! (Case Study) The closure of the News of the World, the best-read Sunday newspaper in the English language, is a stark illustration of the reputational and commercial damage that can result from privacy-intrusive practices carried out in the name of ‘investigative journalism’. This case demonstrates that data protection applies even in relation to the publication of material in the media. However, in such cases, the issue to be considered in the first instance is whether a general public interest could be deemed to apply to the publication of the material. If it does then the general requirements of data protection are set aside. However, if no public interest could legitimately be claimed, then the media must have due regard to their data protection obligations

Principles A number of principles involved in data protection will be discussed and illustrated through case studies. Some cases will illustrate more than one principle: Confidentiality: Southampton Municipality and CCTV cameras case; The Southampton municipality had a policy that all taxis had to have CCTV cameras and audio recording. The Commissioner ruled that the processing was unlawful because it breached the confidentiality principle and that there had not been demonstrated that there was need. Access: Ashbury Taverns case: In this case, the Commissioner received complaint that an access request had been denied by a data processor. The Commissioner’s office issued an enforcement notice requiring Ashbury Tavern to comply with the access

Canadian Regulator v Canadian Insurance Adjusters: Complaints were filed by consumers regarding overboard data collection approaches by Canadian insurance adjusters. The loss adjusters required claimants to sign consent forms which listed several categories of personal information which the adjusters wanted to be authorised to obtain from 3 rd parties and also pass on or disclose to whomever. The Commissioner ruled that the complaint was legitimate and that an organisation was not as a condition of the supply of a service or a product, to require an individual to consent to the collection, use, disclosure of information beyond that required to fulfill the explicitly specified and legitimate purpose Adequacy and legitimate purpose

Accountability &Security Safeguards Principle Marks and Spenser, the safeguards case: An agent engaged by M&S lost a computer that contained valuable sensitive personal data. Commissioner ruled that M&S should have put in safeguards to protect the information

Fairness, lawfulness, accuracy & necessity “Solicitors from Hell” case: Reinforces the link between lawful processing and human rights. The publisher said the EU convention on human rights gave freedom of expression and requested people to name and shame “their oppressor solicitors” and he added them to his list of “solicitors from hell” Information of a sensitive nature was contained in the publications. The law society sued the publisher. The court ruling in favour of the law society, held amongst others that the data had been processed in an unfair and unlawful manner, that it was not accurate, not necessary, etc

Limits of use and disclosure Canadian Regulator v Canadian Insurance Adjusters; Complaints were filed by consumers regarding overboard data collection approaches by Canadian insurance adjusters. The loss adjusters required claimants to sign consent forms which listed several categories of personal information which the adjusters wanted to be authorised to obtain from 3 rd parties and also pass on or disclose to whomever. The Commissioner ruled that the complaint was legitimate and that an organisation was not as a condition of the supply of a service or a product, to require an individual to consent to the collection, use, disclosure of information beyond that required to fulfill the explicitly specified and legitimate purpose

Implementation Policy: Privacy Policy (internal) Privacy Policy (external) Information Security Policy Monitoring Policy Records Management Policy. Contracts: Consent Third Parties Data Processors Data Controller’s Representative Employees/ Contractors Assessments Technical Compliance Assessments

Background to Transborder Flow “Transborder data flow" term that arose in the 1980s following concerns in the EU regarding the value of information and the exchange of information across countries between business units of one company, data processing services or purposes ancillary to the commercial engagement. Includes transfer of human resources, financial records customer information: marketing and travel, and for public sector agencies (law enforcement, border controls and tax agencies). TRANS BORDER FLOW OF PERSONAL INFORMATION

Application Adequate level of assurance Countries - adequate level of protection – assessment Derogation – Data Subject Consent – Transfer is necessary …. – Authorisation Criteria and Methodology for Assessments Contracts Three conditions in order to guarantee a minimum level of protection: the purpose limitation principle, restrictions on onward transfers and the data importers' undertaking of providing the data subjects with the rights of access, rectification, deletion and objection

Limitations on Trans border Flow Member State with harmonised law: recipient establishes that the data is necessary for the performance of a task carried out in the public interest pursuant to the lawful functions of a data controller legitimate interests of the data subject not prejudiced subject to conditions

Non member state with harmonised law/3 rd party adequate level of protection is ensured in the country of the recipient and the data is transferred solely to permit processing otherwise authorised to be undertaken by the controller subject to due diligence assessment and further conditions

Assessment assessed in the light of all the circumstances surrounding the relevant data transfer(s), particular consideration to be given to the nature of the data, the purpose and duration of the proposed processing, the recipient’s country, the relevant laws in force in the third country and the professional rules and security measures which are complied with in that recipient’s country

Deeming by the Authority categories of processing - transfer of personal data to countries outside (i) Swaziland (ii) SADC is not authorized authorize a transfer or a set of transfers of personal information to a recipient country outside Swaziland or SADC which does not in its laws ensure an adequate level of protection - controller satisfies the Authority that it shall ensure adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of the data subjects concerned, and regarding the exercise of the data subject’s rights such safeguards can be appropriated through adequate legal and security measures and contractual clauses in particular

Thank you Mrs. Kuena Mophethe ITU International Expert: Data Protection Law Ms. Gcinaphi Mndzebele ITU National Expert: Data Protection Law