MoALFC Data Governance Framework 2022
MoALFC Data Governance Framework 2022
DATA
GOVERNANCE
FRAMEWORK
For Farmers’ Registration Data
and Roadmap Towards its
Operationalization
TABLE OF CONTENTS
1. Introduction 12
2. Background 18
5. Stakeholder Mapping 42
8. Conclusion 110
2
9. Annexes 111
9.1 Examples of Data Governance PolicyPolicies 115
9.2 HOWTO How to write an (Open) Data Policy 115
9.3 Example Data Protection and Security Guidelines 115
9.4 Data Retention Policy Template 116
9.5 Example Data Protection Impact Assessment 121
9.6 Agricultural Code of Conduct development tool 126
9.7 Informed Consent Templates and Guides 126
9.8 Example Data Sharing Agreement 127
9.9 Data Catalogue Template 136
9.10 Templates Data License Register Templates 137
9.11 Data flow mapping tools 137
9.12 SOP Guide Data Quality 137
9.13 SOP Data Breach 138
3
TABLE OF ABBREVIATIONS
AFA Agriculture and Food Authority
DL Desert Locust
ID Identity Document
IT Information Technology
4
KCSAP Kenya Climate Smart Agriculture Project
5
FOREWARD
In pursuit of 100% food and nutrition security, and in line with the Presidential Big 4
Agenda the Ministry of Agriculture, Livestock, Fisheries and Cooperatives (MoALFC)
in Kenya developed the 10-year Agriculture Sector Transformation and Growth
Strategy (ASTGS 2019-2029). The goal of the ASTGS is to create a vibrant, commercial,
and modern agricultural sector that supports 100% food security in the context of
devolution anchored on increased producer incomes, increasing agricultural output
and value addition, and boosting household food resilience.
Data and digital innovations have been earmarked by the Ministry leadership as key
enablers in achieving our ASTGS objectives, with the ministry working to ensure that
efforts are streamlined towards Establishment of standards and protocols for a shared
data platform to facilitate more evidence-based decisioning and interventions across
the sector, while scaling up digital platforms in the agriculture sector.
It is inherent that stakeholders handling farmer and agriculture related datasets work
within the required regulatory framework that ensures data security, confidentiality
and in conformity with Global Data Protection Regulations (GDPR).
In Kenya, the Office of the Data Protection commission (ODPC) has been the body
mandated with Overseeing the implementation of and being responsible for the
enforcement of the Data Protection Act (2019). The act has made the provisions for
the processing of personal data, rights of data subjects (farmers) and the obligations
of data controllers and processors. The ODPC has further outlined the need for data
protection impact assessment and ensuring that there are processes in place for
organizations to comply with the Data Protection Act.
As a ministry, we have taken concrete steps to ensure our compliance with the Data
Protection Act by the development of this Data Governance Framework in consultation
with key stakeholders including the ODPC. We are proud to have been the first
6
ministry to host the ODPC in an online session held in November 2021 as we sought
to get a detailed understanding of the Data Protection Act and offer guidelines on its
compliance.
In order to have the establish the standards and protocols for data sharing across
the agriculture landscape, the data governance framework sets the tone for guiding
principles and policies for data collection, handling, processing and sharing amongst
stakeholders while ensuring personal farmer data is secure and kept confidential.
As we launch this Data Governance framework, it is my hope that we rapidly adopt the
defined implementation roadmap in order to enable the processes and systems for
seamless exchange of data to further accelerate innovation for our farmers.
This Data governance framework seeks to empower stakeholders with tools and
processes to deliver digital innovations targeting over 1.4 million farmers, including
the implementation initial use case of farmer registry which is key to providing credible
data for providing farmers with e-incentives and e-subsidy which has already been
successfully piloted.
I therefore call upon all stakeholders in the sector to collaborate, align and implement
the recommendations of this key Data Governance Framework to enable realization
of a thriving digital economy for the Kenyan farmers.
7
ACKNOWLEDGEMENT
The journey towards development of this Data Governance Framework has involved
many stakeholders under the coordination of the Agriculture Transformation Office
(ATO).
The support and goodwill from the Cabinet Secretary Ministry of Agriculture, Livestock,
Fisheries and Cooperatives, Permanent secretaries and top ministry officials has been
pivotal towards this accomplishment. The guidance and advise provided by the Office
of the Data Protection Commission (ODPC) has been key in the development of this
framework, which is a key milestone for this Ministry.
We wish to thank the public and private sector players who have been instrumental in
giving their inputs through participation in workshops and responses through online
interviews which took a lot of time and professional commitment. We appreciate
the multi-disciplinary team of individuals drawn from both State and non-state
organizations who provided their critical insights and reviews for the preparation of
this final draft document.
While it is not feasible to list all by name, it is our considered view that every institution
whose perspectives, expertise and time went into the just concluded exercise
and the ultimate development of this framework deserves a special mention. The
invaluable contributions provided by the County Government representatives, farmer
organizations, parastatal bodies and our development partners during the consultative
stakeholder workshops is highly appreciated.
8
technical assistance and facilitation of the necessary workshops. We are cognizant
of the commitment of our donor partners to development of our Data, digitization
and digital innovation ecosystems and their key interest in continuously supporting
the realization of our ASTGS Flagship initiatives. We look forward to further support
for the adoption and implementation of this Data Governance Framework across our
ministry as we set the pace for other Government ministries.
9
EXECUTIVE SUMMARY
Kenya’s Agricultural Sector Transformation and Growth Strategy (ASTGS) seeks to
create a vibrant, commercial, and modern agricultural sector that supports 100% food
security in the context of devolution. Data and digital technologies take an important
enabling role in this transformation and support the sector in reaching its primary
objectives to (1) increase small-scale farmer (SSF), pastoralist, and fisherfolk incomes
for ~3.3M households and impact ~15M Kenyans; (2) increase food availability year-
round by unlocking >500,000 acres of agricultural production and agro-processing
across priority value chains; (3) boost household food resilience and reduce the number
of food-insecure Kenyans to zero.
The rise of digital and data-driven solutions in agriculture holds the promise of
significantly improving agricultural income and livelihoods by giving farmers the tools
to boost productivity and profitability. To date, however, low awareness about the
benefits of data, as well as the lack of sound data management practices, have affected
the trust that farmers have in digital technologies. Consequently, the adoption of
digital tools and solutions in the agriculture sector has been slow and wanting. The
lack of proper data governance has also led to farmers’ data being fragmented and
handled by different stakeholders from both the public and private sectors without
clear guidance. This has left the farmers with little say in how their data is being used,
thus impeding the digital transformation of the whole sector.
To strengthen farmers’ trust and give them greater control over who uses the data that
is produced on their farms and for what purposes, the Ministry of Agriculture, Livestock,
Fisheries, and Cooperatives (MoALFC), in its Digitization and Coordination of Kenya’s
Agricultural Sector Data guidance document, calls for the development of policies,
standards, and protocols to govern agricultural data. Such policies, standards, and
protocols, which in their sum constitute what is called a Data Governance Framework,
10
help determine how and when decisions must be made about the gathering and use
of agriculture data. Well-functioning Data Governance Frameworks usually accomplish
several goals: They (i) highlight rules for data use (e.g., who is allowed to collect and
share it), (ii) reduce the risks associated with the collection, storage, and use of data,
(iii) ensure clarity and consistency with regards to roles and responsibilities, (iv) help
comply with privacy and other regulations, (v) increase value creation through data, (vi)
improve data-driven decision making, and (vii) strengthen communication between
relevant actors.
As a first step towards a holistic framework governing agricultural data in Kenya, the
MoALFC has developed a Data Governance Framework for farmers’ registration data in
accordance with use case 1 of the Digitization and Coordination of Kenya’s Agricultural
Sector Data guidance document. With the aim of supporting the implementation of
the ASTGS Flagship 8 on data and innovation, the framework builds upon already
existing policies and guidelines in the field –in Kenya and beyond – and encompasses
five central governance pillars. The first pillar defines roles and assigns responsibilities
for decision areas to these roles. Data stewards, managers and editors, data handlers,
and data experts are the backbone of every Data Governance Framework. The right
attribution of these functions and mandates ensures that farmers’ data is accurately
collected and handled. The second pillar addresses the regulatory environment
for collecting and processing farmers’ data which is largely governed by the Data
Protection Act adopted in 2019. Six key data privacy standards such as informed
consent and privacy-by-design are outlined, and their applications discussed. The third
pillar focuses on the policies and guidelines needed to set out the context in which the
responsible actors and third parties can manage farmers’ registration data. Relevant
examples hereby include open data and data retention policies or data protection
and security guidelines. The fourth pillar of data governance is targeted at hands-on
tools and practices which help individuals and entities apply policies and guidelines.
It provides a set of mechanisms and instruments to safeguard the personal data of
farmers and facilitate the sharing of agricultural data. The last pillar of the framework
tackles questions regarding the establishment of key processes and procedures for
data management and provides guidance on how to address them.
While the Data Governance Framework developed sets out the necessary parameters
to enable sustainable and human-centered data governance in the agricultural sector,
it has to be acknowledged that the framework will only deliver on its promises and
goals if it translates into action. Hence, it is only to be seen as a stepping stone for
the digital transformation aspired to in the ASTGS. However, to help operationalize
the Data Governance Framework, a road map with seven key steps to prioritize when
working on its implementation has been developed by the MoALFC. The road map
is presented in the second part of this document and shall serve as a reference for
the next steps to be undertaken. In addition, to help relevant actors in bringing the
individual pillars into action, practical templates and examples have been complied
in the annexes.
11
1
INTRODUCTION
1
increase small-scale farmer (SSF),
pastoralist, and fisher folk incomes
2
unlocking >500,000 acres of agricultural
production and agro-processing across
priority value chains
12
The Ministry of Agriculture, Livestock, One of the underlying challenges for all
Fisheries and Cooperatives (MoALFC) use cases is the need for seamless and
supports this strategy by implementing lawful exchange of data and finding the
nine flagships. The Agricultural delicate balance between protecting the
Transformation Office (ATO) is leading privacy and confidentiality of farmers’
the efforts for the implementation of personal data and their economic
flagship 8 titled “Research, Innovation interest in that data while still leveraging
and Data,” which is designed to its potential for growth and innovation in
“strengthen research and innovation the sector. Exchanging agricultural data
as launch priority digital and data use between actors has, however, to date
cases to drive better decision-making been far from straightforward and easy
and performance management.” in the Kenyan agricultural data space:
Accordingly, the MoALFC has identified Not only are there data silos, but data
seven priority use cases aligned with collection efforts are often duplicated.
the primary ASTGS outcomes in its Mistrust between relevant stakeholders
strategic document “Digitization and impedes on collaboration, and there are
Coordination of Kenya’s Agricultural significant barriers to scaling data-driven
Sector Data.” They have been selected approaches.
due to the essential role the MoALFC
takes in developing and scaling them.
13
14
Accordingly, as one of the recommended
solutions outlined by MoALFC’s
Digitization Strategy in the form of use
case 7, standards and protocols – or
what could be called a data governance
framework – for a shared national
agriculture data platform should be
established. The data governance
framework is hereby set out to cover data
access, security, sharing, and ownership
aspects of the data collected and
processed in use cases 1-6.
15
Benefits of the Kenya United Agriculture Data Platform
(KUADP strived for, thus include:
16
17
2
BACKGROUND
18
The Flagship 8 digital use case 1 aims therefore be seen as a pilot for the drafting
to accelerate farmer registration and of standards and protocols on data
target eligible farmers with e-incentives. access, security, sharing, and ownership
It also foresees to rely on performance outlined in use case 7 and its key findings
data analytics to improve the incentive and structure as a steppingstone for the
scheme. Hereby it seeks to use digital development of similar frameworks of
tools (e.g., e-voucher) to identify the right the use cases 2-6.
farmers and to distribute and monitor the
performance of the national e-incentive In addition, a road map towards the
scheme proposed in ASTGS. The digital framework’s operationalization has
tools shall increase the likelihood that also been developed to support the
nationally issued farmer subsidies reach implementation of the designed data
the farmers most in need by eliminating governance framework for farmer
arbitrage opportunities in the current registration data. The road map
system, including through a digital encompasses ten key steps which will
farmer register managed by the Ministry allow relevant stakeholders to make the
of Agriculture, Livestock, Fisheries and data governance framework actionable. It
Cooperatives (MoALFC). also provides concrete recommendations
on how to operationalize the different
The data governance framework elements of the data governance
presented in the following sections shall framework and what should be prioritized.
19
3
OBJECTIVE AND
METHODOLOGY
The objective for the design of the data governance framework
and the roadmap is to:
20
The development of the data governance
framework and the road map followed a
consultative and reiterative approach
with interviews conducted with relevant
stakeholders during October and
November 2021. Moreover, existing
documents regarding data policies and
processes provided by the consulted
actors were reviewed, and by desk
research was carried out.
21
4
CURRENT STATE
OF FARMERS’ DATA
GOVERNANCE
4.1 TYPES OF FARMERS’ DATA
COLLECTED
In 2017, the Technical Center for Agricultural and Rural
Cooperation ACP-EU (CTA), as a partner of the Global Open
Data in Nutrition and Agriculture (GODAN), commissioned
a study1 to compile and categorize the different types of
farmers’ data which can potentially be collected. In 2018, the
US Agency for International Development (USAID), in its report
on Digital Farmers Profiles2, complemented the work of CTA
with additional data types. Taken together, both studies as well
as the consultations with the above-mentioned stakeholders,
below is a comprehensive overview of the different types of
data falling under the category of “farmers’ data”:
22
Table 2: Farmers’ profile data types
» Language preference
» Phone number
» Type of phone
Communication
» Type of information farmer prefers to receive
(on crops, market, etc.)
» Mobile phone usage data
23
DATA CATEGORIES DATA TYPES
» Location of plots
» GPS of plots
» GPS accuracy*, i.e., 4 meters
» Geo-mapping/geo-fencing
» Size of field
Field information
» Elevation
» Soil conditions
» Land title
» Crop history (crops grown over time)
» Type of watering/irrigation sources
» Crops grown
» Varieties grown
Value chain information » Seed types and amount used
» Spacing of plants
» Equipment used
» Date of planting
» Spacing of plants
» Intercropping
» Weather data (rainfall, temperature,
hygrometry)
Production information » Yields (date of harvest, etc.)
» Pest/disease attacks
» Post-harvest (storage, sales)
» Adherence to Good Agricultural Practices
(GAPs); types of planting, fertilizer, pest
control, harvesting techniques used
24
DATA CATEGORIES DATA TYPES
* Additional types of data added and not yet listed in the USAID and CTA studies
According to the Digitization Strategy of the MoALFC, there are six types of farmers’
registration data currently collected:
g Name
g Mobile number
g Location
g Size of land
25
26
The stated goal of the data collection is
to support farmers in investing in yield
improvement (i.e., buy the right inputs
at the right time and use them the right
way) by providing them with e-vouchers
on their mobile phones based on a set
of eligibility criteria. The farmer data
holders outlined are the Kenya Cereal
Enhancement Program-Climate Resilient
Agricultural Livelihoods (KCEP-CRAL),
Kenya Climate Smart Agriculture Project
(KCSAP), National Agricultural and Rural
Inclusive Growth Project (NARIGP) (all
three development partners), DigiFarm,
Kenya National Farmers’ Federation
(KENAFF) (both private sector initiatives)
counties, KALRO as well as Huduma
Namba and the population census (GoK).
27
These data types are collected via online government databases exist, to
Unstructured Supplementary Service date, for agricultural data, including the
Data (USSD) survey and assessed by Kenya Agricultural Information Network
KALRO with the aim of drafting reports on (KAINet). Many of these databases have
the impact of the provided inputs for the moreover not been updated in several
MoALFC for improvement of the farmer years. E.g., there are profiles of ca.
eligibility criteria for inputs. Likewise, two million farmers registered on three
non-personally identifiable data shall be platforms, i.e., DigiFarm, MOA-Info, and
made available to the public over the One Acre, as well as 540.000 registered
platform. The private sector can also rely farmers at KALRO.
on it to better inform production and
distribution decisions. In both cases, it Another challenge emerging from
is foreseen for the data to the collected/ the desk research, interviews and
updated every season, i.e., four times a consultations conducted is that the
year. opinions and practices vary when it
comes to the interpretation of the types
A challenge in the collection of this of farmers’ data to be collected. Also, no
data currently is that while farmers’ common understanding exists among
profile data is available, it is incomplete relevant stakeholders regarding the
and fragmented and requires compiling purpose for which the farmers’ data is to
of databases and additional registration be collected. While the specific reasons
of farmers for full coverage. Moreover, as for data collection appear to be different
highlighted in the Digitization Strategy, from actor to actor, the overall common
much of the agricultural data is currently objectives can broadly be defined
being collected and stored by multiple as understanding farmer needs for
stakeholders such as public sector products, information services, market
institutions, private sector players, and linkages, and finance.
development partners. More than seven
28
4.2 REGULATORY
ENVIRONMENT WITH
REGARDS TO PERSONAL
DATA
While agricultural data is not generally
considered as ‘personal data,’ there are
certain data types like name or mobile
number that are clearly personal. There
are, however, also certain data types
that do not appear to be personal at first
sight but, under some circumstances,
can identify a farmer and thus become
personal information. An example of such
personal data is GIS or location data. If
the geographic coordinates are known
and combined with other data points, the
data may then point to a specific farmer.
This GIS location data would then have to
be considered personal data.
29
The DPA stresses that every data controller or processor
(i.e., agro-dealers, government agencies like the MoALFC,
and any other actors collecting and processing farmers’
data) must ensure:
30
DEFINITION OF NON-PERSONAL DATA
31
The objectives of the DPA can be
summarized in five main points:
g Data collection.
g Disclosure of data.
g Retention of data.
g Updating of data.
32
Given that some of the farmers’ data
sets collected in use case 1 fall under the
definition of personal data, their usage
has to be compliant with the DPA. There
are eight legal bases for the lawful use
of personal (farmers) data that data
processors and controllers in the agriculture
sector have to consider. Personal farmers’
data can be processed if:
33
For the data types under use case 1, which are non-personal
data, the Data Protection Act does not apply. For these
types of data, no public legislative framework governing
their use exists. Their transaction is currently governed by
contracts and licensing agreements. However, the terms of
these contracts and agreements are often complex, which
leaves smallholder farmers with very little negotiating power
and mistrustful.
34
If an agriculture stakeholder is classified industry, the volumes of data processed,
as a data controller or a data processor, whether sensitive personal data is being
it is responsible for ensuring that it processed, amongst other matters.
complies first with the data protection The Data Commissioner shall issue a
law and demonstrates compliance certificate of registration where a data
with the regulation’s data protection controller or data processor meets the
principles. It ensures privacy by design requirements for registration.
and default by taking all the necessary
technical measures and safeguarding The data controller and the data processor
data subjects’ rights. shall enter into a written contract which
shall provide that the data processor shall
It is worth noting that these basic act only on instructions received from
obligations apply to both the data the data controller and shall be bound
controllers and the data processors. by obligations of the data controller.
Furthermore, according to section 18 As it has already been noted, the data
of the DPA 2019, all data controllers controllers and data processors have
and data processors are required to be the same basic obligations, but they do
registered with the Commissioner. The not have an equal level of responsibility.
Commissioner is required to prescribe Below is a more precise explanation of
thresholds for mandatory registration data controllers’ and data processors’
and to consider the nature of the obligations.
35
Obligations of a data controller under DPA 2019
The data controller must exercise overall control over the purpose for
which, and the way, personal data is processed. Therefore, activities such
g as interpretation, the exercise of professional judgment, or significant
decision-making in relation to personal data are a data controller‘s
responsibility.
g The data controller is also responsible for the compliance of their data
processor(s).
36
Obligations of data processors under DPA 2019:
g data processor will also need to take all the proper measures to protect
and safeguard personal data to ensure data security, including protection
against accidental or unlawful destruction or loss, alteration, unauthorized
disclosure, or access.
g of a personal data breach, they must notify the relevant controller without
undue delay. A data processor must also assist the data controller in
complying with its obligations regarding personal data breaches.
37
4.3 ALREADY
3 Access to research data
EXISTING POLICIES
AND GUIDELINES ON 4
Data from collaborative
research
FARMERS’ DATA
5
Collection and handling of
In the agricultural sector in Kenya, some restricted data
policies and guidelines have already been
6
developed by various stakeholders in Dissemination and publication
relation to farmers’ data. In the following, of data products and services
a short overview of the most important
and relevant ones is provided, which
could be used as a good starting point The policy also provides guidelines
for the development of data policies around the collection of farmers’ data,
for the Kenya United Agriculture Data ownership issues and intellectual
Platform (KUADP. property (IP) rights.
KALRO is keeping a farmer register KALRO ICT policy: The broad objective
that collects farm data that, among of KALRO is to develop a knowledge
others, includes personal data such as management platform that will enhance
biographical data, demographic data, knowledge sharing and dissemination
location, farm area geo-recording, and across the organization and key
data value chains. Since there are concerns stakeholders. Therefore, the ICT policy
around data collection and sharing, such objective is the implementation of
as data misuse, privacy violations, security infrastructure for enhanced security and
issues, data inaccuracies, conflict of integrity as well as reduced redundancy
interests, and lack of digital literacy with of ICTs. It entails sub-policies that cover
regards to the data in question, KALRO the following topics:
has developed the following policies:
KALRO research data policy: It aims to
ensure that all relevant data is collected, ICT infrastructure development
appropriately managed, and made
available to the public and all partners
1
Adoption of Standards for
and stakeholders. This policy explicitly ICT governance
guides the organization in managing and
using data around the following 6 topic
areas: 2 Establishment of ICT Units
3
Information Security
1 Collection of research data Management System
4
Access to ICT infrastructure
2 Retention of research data and information
38
KALRO ICT open data policy and
5
Protection of intellectual strategy – Towards food security in
property Kenya: This policy aims to foster an
enabling environment that will regulate
6 Monitoring the use of ICT the everyday operations of publishing
data and also ensure the reusability of the
data. It addresses and outlines:
7
Safe and Appropriate Use of
ICT Hardware
Both the KALRO data research policy Initiatives and incentives for
and the ICT policy should be examined
in conjunction with the KALRO data
g stakeholder participation in
open data
management policy.
39
Beyond the policies developed by of Agriculture of the MoALFC to enable
KALRO, the following policies and officials and other stakeholders at various
guidelines are relevant: levels to adopt a common approach to
agricultural and nutrition data collection
The Draft Agriculture Policy (Feb and management based on universally
2019) to be signed: The policy outlines recommended procedures. The
policy statements and articulates Guidelines are also intended to improve
the position of national and county the availability, quality, and reliability of
governments on issues important to the agricultural and nutrition data through
use cases – including information and enhanced data validation, analysis,
data management, extension, research dissemination, archiving, and use of
and development, and human resource modern technology. The Guidelines are
development. organized in the form of sub-themes
for each chapter. For every sub-theme,
Agricultural and Nutrition Data the adopted organization includes an
Collection and Management (ADCM) introduction with basic principles for the
Guidelines: They have been developed sub-theme, type of data to be collected,
by the State Department for Crop requirements for data collection, and
Development and Agricultural Research procedures for data collection. Also
40
included for each sub-theme are the policies about farmers registration as it
reporting tables and reporting formats defines in a very concrete way possible
at various levels of data reporting. For roles and responsibilities among the
practical application, these Guidelines actors, decisions about data access,
are to be used together with the data collection and maintenance, data
Agricultural and nutrition data Collection documentation, a data inventory system,
and Management Training Manual, which data quality, data ownership, and data
the State Department of Agriculture has security issues.
developed.
41
5
STAKEHOLDER
MAPPING
42
Table 3: Stakeholder Map Farmers’ Registration Data Space
NAME DESCRIPTION
43
NAME DESCRIPTION
44
NAME DESCRIPTION
45
NAME DESCRIPTION
46
NAME DESCRIPTION
47
48
The participation of these stakeholders
is considered essential in the discussions
for the validation and implementation
of the data governance framework
for farmers’ registration data. Many of
them have already developed policies,
processes, and best practices around
farmers’ data sharing that can be used
as a reference point for the MoALFC and
avoid duplications.
49
6
DATA GOVERNANCE
FRAMEWORK
FOR FARMERS’
REGISTRATION
DATA
Farmers’ registration data and their use for improved
decision-making and innovation are critical aspects
for the digital transition of the Kenyan agricultural
sector. Unspecified and fragmented data governance
modalities have given rise to concerns about how
farmers’ data is gathered, thus reducing farmers’
willingness to adopt digital tools and services. This
affects the availability and accessibility of data relevant
for the digital use cases 2-6 and therefore impedes the
development of the agricultural sector.
50
Accordingly, the development of to create a common understanding of
clear, transparent, and rights-based what is meant with the concept of a data
governance processes for farmers’ data governance framework.
is essential. In the following section,
an overview of the data governance Overall, a data governance framework
framework for farmers’ registration data thus provides a framework for the
will be presented, and its individual development and enforcement of
pillars discussed. Considering the facts, policies, standards, principles, and
the objectives, and the farmers’ data guidelines that address issues such as
types to be collected regarding the the circumstances under which data can
impact monitoring of provided subsidies be accessed, privacy and confidentiality
is yet to be further clarified between of individuals, and compliance with
stakeholders, the framework will focus relevant legislation. A well-planned data
on the farmers’ registration data governance framework ensures that data
and farmers’ data related to impact is trusted, well-documented, and easy to
reporting as mentioned in 4.1. Before find and that it is kept secure, compliant,
taking a deep dive into the various and confidential.
aspects of the framework, it iscritical
6.1 DEFINITION
51
6.2 THE FIVE PILLARS privacy and security standards. Investing
heavily in the training and education of
OF DATA GOVERNANCE these key personnel is essential.
1 2
Digital Skills
Development
5 3
Processes &
Policies
Procedures
Tools and
Practices
52
The third pillar addresses policies conduct is discussed and provided. It
and guidelines that set out the context helps set common standards for data-
in which the people responsible and sharing and provides principles that the
third parties manage and use farmers’ signatories agree to apply in their data
registration data.The core purpose of sharing contracts. As a complementary
policies and guidelines around farmers’ instrument, a template and guide for the
data is to recognize that it is a critical asset drafting of data sharing agreements are
and must be treated as such. Relevant outlined. Furthermore, to assist actors
policies and guidelines that need to be in keeping an overview of the different
developed under this pillar are (i) an types of data collected, used, and
internal data governance policy, (ii) an shared under use case 1, templates for
external (open) data policy, (iii) internal data inventories as well as a data license
data protection and security guidelines, register are provided under pillar four.
as well as (iv) a data retention policy.
Finally, the fifth pillar addresses
The fourth pillar of data governance questions regarding the establishment
focuses on tools and practices which of key processes and procedures
help responsible individuals and entities for data management in the realm
apply the policies and guidelines outlined of use case 1 on farmers’ registration.
in the third pillar. The first set of tools Mapping processed data is essential
encompasses instruments to safeguard in relation to data flows, actors, and
the personal data of farmers, namely, activities, from data collection to data
(a) information on how to anonymize sharing (Standard Operating Procedure
and pseudonymize data, (b) a data format). These processes and standards
protection impact assessment (DPIA), (c) include definitions of how data will be
best practices on data minimization, as stored, moved, changed, accessed, and
well as (d) an informed consent template. secured. Mechanisms to monitor data
The second set of instruments centers on quality need to be established as well.
facilitating the sharing of farmers’ data.
To address the challenges of business- The following table discusses the five data
to-business (B2B) and business-to- governance pillars in detail. However,
government (B2G) data sharing, an online before taking a more in-depth look at the
tool for drafting an agricultural code of individual pillars, it should be noted that
53
the development of data governance outlined in the subsequent sections
frameworks for the agricultural sector have been drafted in the spirit of not
is nothing fundamentally new. Over the reinventing the wheel but building and
last year, different organizations and reusing already existing best practices
actors have designed and implemented and examples. Accordingly, throughout
frameworks better to govern their the sections of the framework, reference
agricultural data within a given data is made to available resources and
ecosystem. Hence, the different pillars materials from other contexts.
The different roles and responsibilities suggested as part of the data governance
framework for farmers registration data are presented below. This list of roles and
responsibilities should be used as a “living” document and adjusted if changes
become necessary in the process of implementing the framework.
IT Professionals focusing on
or
Operational
Level Data Handlers -
IT Professionals in
relevant entities
collecting and editing
teh farmers data
Data Experts - Providing Data Subjects -
training and raising Farmers Registering
awareness among
relevant actors
54
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
55
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
56
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
57
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
Overview of responsibilities:
» Define the data and identify assets within their
own data domains. This ensures there is no
These roles
conflict with other data types.
are typically
» Focusing on the quality of data for a data domain
located in the
(data type) using user feedback, concerns,
IT department
questions and internal reporting metrics
and filled
» Involved/facilitator in cross-organizational
by senior
resolution of data definition, production, and
IT or data
usage issues for the data domain in question
Data Domain professionals
» Escalating well-documented issues to the Steering
Stewards with expertise
Body with or without recommendation.
on data
» Documenting data classification, compliance
assets. Data
rules, and rules for data in their domain.
Governance
» Create processes and procedures along with
Council
access controls to monitor adherence.
members will
» Making certain the rules are communicated to all
appoint the
stakeholders of data in that domain
coordinators.
» Participating in exchange groups (with other
domain stewards)
» This includes establishing internal policies and
standards—and enforcing those
» Monitor data usage to assist teams, share best
practice trends in data use, and provide insight
into how and where data to help in day-to-day
decision-making.
» Ensure compliance and security of the data in
their domain. Data stewards are responsible for
protecting the data—while providing information
on potential risks and offering regulatory
guidance.
58
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
59
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
Overview of responsibilities:
» Focusing on consistent protection and
Data handlers
classification of data (personal, non-personal,
(Operational
public, internal use …).
level)
» Technical handling of personal data and
application of data protection and security
safeguards as well as guidelines to comply with
privacy standards of the Data Protection Act.
» Collection of informed consent from farmers
for the use of their personal data; archive the
collected consent forms for auditing purposes
60
SUGGESTED
ROLES RESPONSIBILITIES
ACTOR(S)
61
PILLAR 2
Privacy Standards
Kenya’s data protection regulation provides the framework for the legal
collection and processing of farmers’ personal data. When it comes to the
different farmers’ data types collected in use case 1, it can be noted that while
some are personal, some are not, and some might become personal depending
on the context of their use:
» Personal data
» Farmer national ID number » Personal data
» Name » Personal data
» Mobile number » Personal data
» Address » Personal data depending on the
» Size of land context
» Value chains grown » Personal data depending on the
» Yield of value chains produced context
» Income from agricultural output » Non-personal data
» Type of inputs (i.e. subsidies) » Personal data
received » Personal data depending on
» Quantity of inputs received context
» Price of inputs received » Non-personal data
» Geographic location of inputs » Non-personal data
received » Personal data depending on the
context
According to the DAPA, for the data types falling under the category of personal
data, there needs to be a legal basis for their processing (section 30). Looking
at the eight legal bases for the lawful use of personal (farmers) data that data
controllers and data processors in the agriculture sector have to consider,
it becomes apparent that different legal bases might apply to the different
personal data sets under use case 1.
62
Privacy Standards
Namely, the legal bases for processing personal (farmers) data are the
following:
Consent: The farmer has given consent to the processing for one or
1 more specified purposes.
63
Privacy Standards
In light of having identified the data types falling within the scope of the DPA
and having discussed the legal basis for their use, their governance in terms
of privacy protection will be guided by six key standards which help ensure
compliance with the law. The six standards are outlined and discussed in detail
in the following:
64
Privacy Standards
Section 32 of the DPA states that a data controller or data processor shall
bear the burden of proof for establishing a data subject’s consent to the
processing of their personal data for a specified purpose. Therefore, informed
consent is required when processing personal data. Farmers’ consent must
be based on their understanding of the processing activities (e.g., collection,
recording, organization, structuring, storage, adaptation or alteration, retrieval,
consultation, use, disclosure by transmission, dissemination or otherwise making
available, alignment or combination, restriction, erasure or destruction) and
its implications on their rights. Data controllers or data processors have an
obligation to ensure that there is accurate and full information regarding the
nature of personal data to be processed, the specific purposes of the processing
of data should be clearly stated, the recipients of possible transfers, as well as
farmers’ rights (e.g., right to data portability, right to erasure / to be forgotten).
Where the processing is based on consent, farmers have the right to withdraw
their consent, which, in effect, operates as a right to stop the processing. The
withdrawal of consent shall not affect the lawfulness of processing based on
prior consent before its withdrawal. Finally, any consequences of not consenting
to the processing in question and any relevant information must be provided to
farmers to enable them to give informed consent.
Data controllers and data processors must obtain new and specific consent if
the purpose for data processing has changed after consent was obtained or if an
additional purpose is intended. In this case, the information to be provided will
focus on what is needed in the specific context in relation to the purpose. Any
consent obtained prior to the commencement of the DPA and is compliant with
the provisions of the Act will continue to be valid.
Informed consent should provide data subjects (farmers) with the practical
means to understand and effectively control who has access to data about them
and how it is stored, used, and shared. It must be given voluntarily without
coercion, with sufficient disclosure to enable reasoned judgment, and with
the capacity to make a legally binding commitment. Typically, written consent
documentation includes an informed consent signed by the farmer. Broad but
vague statements should be avoided, and clear and plain language should be
used.
65
Privacy Standards
66
Privacy Standards
1 Derived from the privacy-by-design framework of Dr. Ann Cavoukian, former Information and
Privacy Commissioner for the Canadian province of Ontario
67
Privacy Standards
» End-to-end security: This step entails keeping farmers’ data secure at every
point, from collecting it to using it to disclosing it to destroying it. Some
of the practical measures include: (i) using encryption where appropriate,
(ii) using a range of security measures, including physical and electronic
restrictions (such as passwords) and organizational restrictions (such as giving
different staff members different and appropriate levels of access to data),
and (iii) monitoring access points to data so that breaches can be swiftly
identified. These security measures are ideally detailed in the data privacy
and security policy to inform both the ODPC and farmers.
» Visibility and transparency: The idea behind this step is that data subjects,
i.e., registered farmers, should be kept informed and that this will not only
increase their trust in the data governance framework but also ensure the
accountability of data processors and controllers for the way they handle
farmers’ registration data. Central elements here are to (i) make the contact
details of every data processor and controller, as well as their DPOs publicly
available, (ii) communicate the purpose(s) for data collection as well as the
legal basis under which the data is processed, and (iii) be transparent about
who data is shared with, how long the data is kept and whether automated
decision-making is applied to the data in question.
These key steps should also be mirrored in the data privacy and security policy
discussed further in pillar 3 and complemented by the other privacy standards
(pillar 2).
68
Privacy Standards
69
PILLAR 3
The policy-approving group for the Guide for (open) data policy in
internal data governance policy is the Annex 9.2
Data Governance Council.
70
Policies and Guidelines
71
PILLAR 4
Tools
Data governance tools aid in the process of implementing the policies and standards
set out in pillars 2 and 3. The data handlers and data stewards, especially, benefit from
the existence of these tools to guide their actions. For all the tools discussed below, it
is important to assign ownership. This means that an owner is identified and assigned
responsibility for their content and maintenance. These owners also inform the Steering
Body regarding the usefulness of the tools and about challenges encountered in their
usage. Usually, Data Steward Coordinators take over this role.
1 Based on the guide provided by the data science consultancy Record Evolution at: https://www.
record-evolution.de/en/data-anonymization-techniques-and-best-practices-a-quick-guide/
72
Tools
73
Tools
» Data encryption: This method changes the personal data into another form
or code so that data that is categorized as sensitive is replaced with data in an
unreadable format. Certain authorized users have access to a password that
allows them to view the data in its original format. In many cases, encryption
can provide an appropriate safeguard against the unauthorized or unlawful
processing of personal data, especially in cases where it is not possible to
implement alternative measures. Data encryption also provides a safe harbor
from breach notifications as it permits the securing of remote locations and
setting the baseline for safe outsourcing and licensing of data. Likewise, it can
also avoid that service provider’s access or inadvertently exposing data.
» Nulling out: The basic function applied in this this technique is removing and
deleting sensitive data from the data set. All elements of sensitive information,
such as the farmers’ name, address, or phone number, become null values.
» Substitution: By definition, this technique replaces the contents of a database
column or row with data from a predefined list of fake data to ensure that the
data is not traced back to the individual. The key characteristic of this method
is that it maintains the integrity of the original information.
» Number and date variance: This anonymization technique comes into play
when dealing with numeric and date columns. In this scenario, each value in
a column is altered by a random percentage of its actual value. The data is
modified to the point that it can no longer be traced back to its original form.
Data security practices are about helping to protect farmers’ data from
unauthorized access from malicious actors. This includes IT access and security
controls, appropriate technological, and physical controls as outlined below2:
2 https://www.netwrix.com/data_security_best_practices.html
74
Tools
Full Control The user can read, execute, modify and delete data;
assign permissions; and take ownership.
Read and Execute The user can run the executable data.
Read The user can read but not modify the data.
Write The user can read and modify the data but not delete it.
Different permissions may apply to different types of data. Usually, users should
not be prohibited from copying and storing sensitive personal data locally but
forced to work with the data remotely. The cache of the client and server system
should both be comprehensively cleaned after a session ends or a user logs off,
or else encrypted RAM drives should be relied upon. Sensitive personal farmers’
data should, in the best-case scenario, never be stored on a portable system. All
systems holding personal farmers’ data should have a login of some kind and
conditions set to lock the system if questionable usage happens.
Access control lists: An access control list (ACL) is a list stating who is allowed
to access what type of data and at what level. It can be an internal part of the
National Agriculture Data Platform operating system or part of one or several of
its applications. For instance, a specific function of the platform might have an
ACL that lists which users have what permissions regarding the function. ACLs
can be based on whitelists or blacklists. A whitelist encompasses items that are
allowed, e.g., a list of data types that users are permitted to access. Blacklists are
lists of actions that are prohibited, such as access or download of certain data
types.
75
Tools
Security devices and methods: Certain devices and systems help to further restrict
access to data. In the following, a list of the most commonly implemented ones
is provided:
» Data loss prevention (DLP) — DLP systems monitor the servers, workstations,
and networks to ensure that sensitive data like farmers’ data is not deleted,
removed, changed, or copied. They also monitor who is using and transmitting
the data to identify unauthorized actions and use.
» Firewalls — a firewall is one of the first lines of defense in a system as it isolates
one part of the system from another. Firewalls can be standalone, or they can
be included in other infrastructure devices, such as servers and routers. They
can be hardware or software solutions. Firewalls filter out undesirable traffic
and users from entering an organization’s system, preventing data leaks to
malicious third-party servers by malware or hackers.
» Proxy server — these devices have the role of negotiators for requests from user
software requesting access to resources from other servers. A user connects to
the proxy server, requesting some service (e.g., access to farmers’ data type
Y); the proxy server evaluates the request and then allows or denies it.
Laptop security: With laptops, the greatest problems are loss and theft, either
of which can enable malicious actors to access the data on the hard drive. Full-
disk encryption should be used on every laptop holding sensitive farmers’ data
of the Kenya United Agriculture Data Platform (KUADP. Also, using public Wi-Fi
hotspots should be avoided unless a secure communication channel such as a
VPN or SSH is used.
76
Tools
Mobile device security: Mobile end devices can import viruses or other malware
into an entity’s network and extract sensitive farmers’ data from its servers. To
counter these threats, mobile devices have to be controlled very strictly. Devices
that are allowed to connect to the entity’s network should be checked for viruses,
and removable devices should be encrypted. As an overall strategy, it is vital
to focus on the data, not the device it resides on. Smartphones often contain
sensitive data, yet less security applies to them than to laptops that contain the
same data.
77
Tools
A DPIA does not have to indicate that all risks have been eradicated. But it
should help document them and assess whether and remaining risks are
justified. DPIAs are a legal requirement for processing that is likely to be high
risk. But an effective DPIA can also bring broader compliance and financial and
reputational benefits, helping demonstrate accountability and building trust
and engagement with individuals.
78
Tools
Identify
Keep under need for a
review DPIA
Integrate
outcomes into
9 1 Describe the
plan processing
8 2
6 4
Identify 5 Assess
measures to necessity and
migitage risks proportionality
Identify and
assess risks
The template is provided in the Annex 9.5 or can be looked up here; The
Kenyan Office of the Data Protection Commissioner (ODPC) is currently
also development a template that will be accessible here, once published.
79
Tools
80
Tools
Moreover, the consent form should confirm and allow the farmer to respond
to points such as:
» the farmer has read and understood information about the collection of
his/her data
» the farmer has been given the opportunity to ask questions
» the farmer voluntarily agrees to participate in the data collection process
» the farmer understands he or she can withdraw their participation or
consent at any time or by a specific deadline, without giving reasons and
without penalty
» the farmer acknowledges the nature of the personal data that will be
collected and permits it to be used in the manner disclosed
» the farmer accepts the implications to their privacy and the potential risk
of harm
» provide a specific individual and title with whom to follow up for any
clarification, concern, or complaint
» confirm that the farmer will be given a copy of the form, and the data
controller-data processor will retain the signed original
Finally, the lawful basis of consent is likely to overlap with other lawful bases.
For example, a data controller and or data processor may have a statutory
obligation to process certain personal data. However, the data controller and/
or data processor may wish to process more personal data than is required
under the statute for a specified purpose. In this case, there is a need to
adopt hybrid models, where consent is sought for any processing that may
be deemed to be beyond the statutory requirement and the data subject
advised of the statutory requirement and its limitations with respect to the
processing activity
81
Tools
82
Tools
As highlighted by the GODAN initiative, farmers’ data travels from the farm
through many other actors (e.g., extensionists, advisory service providers, farmers’
associations, financial service providers, government, etc.), before coming back
to the farm – aggregated and combined and in the form of services. Such data
flows potentially open up access to sensitive farmers’ data that should only be
shared with certain actors under certain conditions or needs to be anonymized to
mitigate negative impacts on farmers’ legitimate interests and privacy rights. This
holds especially true for smallholder farmers, whose data often coincides with
household data and sensitive personal data but are often in the most vulnerable
position to claim their data rights.
While there are policies and laws that govern personal data and data rights,
regulations still do not comprehensively encompass all farmers’ data flows.
Agricultural Codes of Conduct have started to emerge as a self-regulatory remedy
to fill the legislative void, setting common standards for data sharing agreements
based on the needs of communities while guaranteeing an even distribution
of benefits between agricultural chain actors. Codes provide principles that the
signatories agree to apply in their contracts and a conceptual basis for general,
scalable guidelines for everyone dealing with the production, ownership, sharing,
and use of data in agriculture, i.e., farmers’ data.
Agricultural Codes
of Conduct
Builds awareness
(self-regulatory
(informed consent)
and non-legally
binding
Agricultural Codes
Address
of Conduct Creates trust and
normative
(self-regulatory transparency
gaps
and non-legally
binding
Is voluntary Fosters
and principle participation and
based inclusiveness
83
Tools
1. Definitions
2. Ability to control and access
3. Consent for collection, access, and control
4. Purpose Limitation
5. Notice
6. Transparency and Consistency
7. Rights of the Data Originator
8. Right to Benefit
9. Disclosure, use, and sale limitation
10. Data retention and availability
11. Contract Termination
12. Unlawful or anti-competitive activities
13. Data protection safeguards
14. Liability and Protection of IP rights
15. Simple and Understandable Contracts
16. Certification Schemes
17. Compliance with National and International Laws
84
Tools
For use case 1 and the sharing of farmers’ registration data, data sharing
agreements will potentially be required between:
» MoALFC – KALRO
» MoALFC-KCEP-CRAL
» MoALFC-EAGG
» MoALFC-Counties
» KCEP-CRAL-Counties
» Counties-KENAFF
» KEPHIS-KENAFF
85
Tools
» Specify the name, description, and any unique reference number to identify
the data to be shared
» If the data is described in a data catalogue accessible to both parties, it might
be described most easily and clearly by referencing its catalogue entry.
» Determine the structure (e.g., attributes, parameters, etc.) of the data that
will be shared
» Time period the data covers(if appropriate)
» Format of the data and data quality required
» Define the source of the data (one organization or from a combination
of different sources (for the latter, intellectual property rights could have
implications for how the data can be shared and used))
» Information about whether the contributing sources know that the data will
be shared
» Define if the sharing is a one-off transfer or if updates are to be made. If
updates are required: Would they be as necessary corrections to the data?
Would they be additions to the data? How regularly can they be made? If
this is a one-off transfer of data, when will the data be provided?
» Clearly outline roles and responsibilities. Where possible, include name
and contact details of organization representatives as well as a description
of roles and responsibilities, e.g., who will prepare and update data, who
will monitor implementation of the agreement, who to contact to resolve
disputes, etc.
86
Tools
This section focuses on specifying what the data can be used for. This can be
linked to the data’s source. Where data comes from more than one source
(i.e., different organizations) you will need to check with the original data
providers whether you have the right to share the data and confirm any
restrictions on use.
» Permissions needed for each party describing how they can use the data
» Requirements to follow in order to retain those permissions, e.g., to attribute
the source of the data
» Restrictions which might be setup to limit the use of the data, e.g., sharing
data with third parties
» Define whether the data can be used in commercial products and services
» Consider whether permissions are needed (e.g., from third parties or
individual consent) to share or use the farmers’ data
» If a data license is to be used, define which one
Derived data
This section focuses on products that might be produced that incorporate
data that has been shared:
» Define who will have rights over or have access to what has been produced
using the data that has been shared
» Specify if derived data should be published and, if so, what licensing
restrictions might apply to how that data is published for reuse by others
Since the data that is going to be collected, used, and shared in the Kenya
United Agriculture Data Platform (KUADP is about farmers’ personal data,
clauses should be added to specify:
» How the data will be secured in transit to third parties and while in their
control
» The retention period for the data
» Imitations to third-party use of the data
87
Tools
A template for data sharing between a private sector and a public sector
entity can be found in Annex 9.8.
Data Catalogue
A good data catalogue should have an owner responsible for its creation and
ongoing maintenance (when data fields are changed, removed, or added),
e.g., KALRO. Moreover, the catalogue presents an important basis for the
development of data policies (internal and external) and the technical setup
of the National Agriculture Data Platform, such as the development of
software tools that will be used to build the platform. This would provide a
centralized management of data lineage.
The catalogue can also be helpful in identifying personal data that is used and
shared within the platform for farmers’ registration, therefore, informing the
inventory for personal data processing activities (pillar 2). A centralized data
catalogue effort and aligned methodology will help determine which data
domains/types will receive priority and data governance resources (staff time
to document data processes, clean data, create data outputs and reports,
and make decisions about data, etc.).
88
Tools
Once the legal basis for the collection and processing of farmers’ data is
clarified and the key data processes documented, a data license register can
be developed. A data license register lists data types and accompanying
licenses and helps to track licenses attached to different data types. This can
be useful in supporting staff in determining whether data can be shared and
under what conditions when external stakeholders make requests to access
data.
89
PILLAR 5
Where does the data come from? How is it transmitted and moved across the
platform? Where is it stored? How is the data ultimately used internally (e.g.,
reports)? How is it used externally (e.g., sharing with stakeholders)? Data flow
mapping is a step-by-step process where the involved stakeholders construct
a graphic that documents data management processes: identification of data
sources, data collection processes and tools, data collation systems and tools,
data analysis, data reporting, and data use. Data flow mapping is useful for
understanding how data quality, data management, and data assessment work
together.
The map enables one to document processes and tools that comprise data
management. Visualizing a data management system, including stakeholder
involvement, allows programs to better understand their systems and identify
areas that need strengthening in order to avoid potential data quality problems
and root out those that arise.
90
Processes and Procedures
» Start by outlining the current project framework for service delivery. Include
a review of key project implementation processes in order to lay out the key
data management elements.
» Identify all stages at which important program data are sourced; note when
documents and data are received.
» List all essential data collection, collation, and analysis processes, and the
tools used and the people responsible for managing each stage.
» List all reporting processes that the project uses to disseminate data to
stakeholders.
» Identify real and potential data quality problems at various stages of data
collection. Ask:
» Are there tools available for data collection, and are they appropriate?
» Are data collected consistently?
» Are the responsible people properly trained on the tools for data collection?
» How are the data analyzed, reported, and used for decision making?
» Is data integrity maintained? Consider here data security and the integrity of
respondents and data collectors.
» Brainstorm and identify solutions to address data quality problems at each
stage of data collection
91
Processes and Procedures
There are several Standard Operating Procedures (SOPs) that can be put
in place to facilitate the governance of farmers’ data in a harmonized and
streamlined fashion. The most relevant are:
Monitoring Processes
92
Processes and Procedures
Audits, on the other hand, entail reviewing the ongoing monitoring process
and verifying if it is effective in achieving the desired result. When it comes
to high-risk compliance areas like the use of personal farmers’ data, audit
objectives are to (i) verify that data stewards are meeting their monitoring
obligations; and (ii) validate that the process is achieving desired results. This
includes confirming that controls are in place and functioning as intended or
identifying weaknesses in the monitoring process that need to be addressed.
An audit must be an independent and objective review, which means it should
be done by people external to the entity being audited.
93
7
ROAD MAP
TOWARDS
OPERATIONALIZING
THE DATA
GOVERNANCE
FRAMEWORK
While Kenya’s agriculture sector requires a
comprehensive data governance framework, this
roadmap focuses on the data governance for farmers’
registration as an example that can be scaled to
incorporate the other priority use-cases. Implementing
the data governance framework will involve substantial
change for all stakeholders operating in the data
space of use case 1. The key to success will be
collaboration between government (at national and
94
county level) and private sector (at highlighted. They are presented in
micro and meso level) in turning the the following, build up on the status
framework into action. To facilitate quo of farmers’ registration data
the implementation of the data governance in Kenya, and offer
governance framework for farmers’ concrete recommendations how to
registration data, ten key steps make the framework actionable.
towards operationalization can be
1 AGRICULTURAL CODES OF
CONDUCT (SELF-REGULATORY
2 MAP DATA FLOWS
AND NON-LEGALLY BINDING)
SET-UP A DATA 4
GOVERNANCE COUNCIL
9 DEVELOP AN
AGRICULTURAL CODE OF
10 PILOT A DATA
SHARING AGREEMENT
CONDUCT
95
7.1 DEVELOP data is to be collected and for which
purposes, is to date not completely
A COMMON agreed upon between the stakeholders
UNDERSTANDING OF involved. This discrepancy between the
different understandings of the data
SET OBJECTIVES to be collected for use case 1 and its
objectives hinders interoperability, the
further attribution of concrete roles and
Step 1 responsibilities, as well as the setup of
the necessary data processes.
The first important step in implementing
the data governance framework for Recommendations
farmers’ registration is engaging all
relevant actors to align on the MoALFC Organize a high-level leadership dialogue
high-level data use objectives for involving all relevant stakeholders to
use case 1. Clearly documenting and clearly communicate the objectives and
communicating the data use objectives relevant data types for use case 1 and
across stakeholders is a best practice also address questions that might exist
that supports effective data governance in that context. This will help create a
and empowers actors who handle shared understanding of what types of
data efficiently and effectively. While farmers’ registration data sets should be
the MoALFC Digitization Strategy collected and for what purpose. Since
establishes objectives regarding the the Digitization Strategy captures the
collection and processing of farmers’ data MoALFC desired impacts, this document
(for registration and impact monitoring), can be used as a baseline to align data
the understanding of the set objectives, objectives.
namely what type of farmers’ registration
96
7.2 MAP DATA FLOWS Who will input the gathered
data into the Kenya United
Step 2 g Agriculture Data Platform
(KUADP according to the set-
out quality requirements
Based on the reached common
Which actors will be able to
understanding with regards to the
objectives for the collection of farmers’
data under step 1, the next important step
g access the data once on the
Kenya United Agriculture
Data Platform (KUADP, and
will be to understand the data’s life cycle.
This means mapping out the data flow of Who will oversee data audits
each type of data. More specifically, the
following must be defined:
g to spot false or inaccurate
data
97
7.3 CREATE JOINT
UNDERSTANDING REGARDING
ROLES, RESPONSIBILITIES, AND
OWNERSHIP
Step 3
Recommendations
98
99
100
7.4 CREATE JOINT
UNDERSTANDING
REGARDING ROLES,
RESPONSIBILITIES, AND
OWNERSHIP
Step 4
Recommendations
101
7.5 TAKE STEPS TOWARDS
COMPLIANCE WITH DPA
Step 5
Recommendations
102
103
7.6 DRAFT FIRST appropriate use of farmers’ data. Given
that there are today already a number of
KEY POLICIES AND policies from other countries available,
GUIDELINES not only could the Ministry build upon
KALRO’s work but also other reference
documents.
Step 6
Recommendations
While some actors like KALRO have Start with developing an internal data
already developed data policies, they governance policy that can then guide
still have to be created for the MoALFC the drafting of an external data policy and
and other involved actors to guide the data protection and security guidelines.
104
7.7 DEVELOP DATA the farmers’ data gathered and utilized.
The more high-quality data one has, the
CATALOGUE more confidence one can have in one’s
decisions. Good data decreases risk and
can result in consistent improvements in
Step 7 results.
During the interviews and consultations,
it was noticed that among the staff of the Recommendations
different organizations and units handling
Create a joint Master data catalogue
personal data, unclarity existed about
for the six data types of farmers’ data
data quality requirements. Furthermore,
across organizations building on the data
only some stakeholders seem to keep
catalogues already available. In addition,
a data catalogue of the farmers’ data
an aligned methodology determining
collected and processed (e.g., the ICT
which data types will receive priority
State Department of Cooperatives).
and data governance resources (data
Clear criteria and improved data quality
handlers and stewards’ time to document
are, however, essential for better
data processes, clean data, and create
decision-making, and the leveraging of
data outputs and reports).
105
7.8 SET UP DATA by the Office of the Data Protection
Commissioner. As a key element of
PROCESSING ACTIVITY the accountability principle under the
INVENTORY DPA, inventorying data processing
activities helps ensure (and demonstrate)
compliance with the data protection
law. In addition, the inventory can help
Step 8
respond to access requests – knowing
what personal data is held and where
it is to be found allows for efficiency
Currently, data processing activities
in handling requests from farmers for
are not or at least not comprehensively
access to their personal information.
enough documented (Agricultural
Statistics Unit of MoALFC has some
documented processes). Documentation Recommendations
of the processing activities is important
in making the information about how Document a data processing inventory by
personal farmers’ data is used available on creating a cross-organizational inventory
request, for example, for an investigation for use case 1.
106
7.9 DEVELOP DATA inclusively. As not all data flows on use
case 1 are governed by the DPA, the
CATALOGUE different actors in the value chains have
to protect themselves from the risks
of data sharing. Codes of Conduct can
Step 9 foster mutual trust and transparency.
107
7.10 PILOT A DATA SHARING
AGREEMENT
Step 10
Recommendations
108
109
8
CONCLUSION
110
The role of the Government in enhancing Understanding the importance of data
the institutional arrangements for the and the great role that digital solutions
collection, discoverability, and usability play in agriculture, the Government
of public and private agricultural data to of Kenya (GoK) has formulated the
support digital innovation of agro-food Agricultural Sector Transformation and
systems and better inform agricultural Growth Strategy (ASTGS). The Ministry
policies and services for farmers is of Agriculture, Livestock, Fisheries, and
essential. Government agencies collect, Cooperatives (MoALFC) supports this
process, and hold a large amount of strategy through the implementation
agricultural data that is of interest to various of nine flagships. The Agricultural
stakeholders such as researchers and the Transformation Office (ATO) is leading
private sector, and farmers themselves. the efforts for the implementation of
Consequently, there is a great need to flagship 8 titled “Research, Innovation
leverage digital technologies to facilitate and Data,” which is designed to
access to this data, particularly through “strengthen research and innovation
open data arrangements. But there are and launch priority digital and data use
also challenges related to having open cases to drive better decision-making
access to data, mainly around privacy, and performance management.” The
data protection and security of farmers’ MoALFC has identified seven priority use
data, exposure of commercially sensitive cases aligned with the primary ASTGS
information, and fear of compliance outcomes in its strategic document
oversight by other government agencies. “Digitization and Coordination of Kenya’s
Agricultural Sector Data.”
111
112
What has been observed with regards
to all the identified use cases (1-6) is
that different stakeholders, including
the MoALFC, farmers, private sector,
and researchers, have an interest in the
same agricultural datasets, along with
competing and/or complementary views
on access, use and extracting value from
them. Therefore, it will beessential to
consider all stakeholders’ concerns. The
perspectives of farmers and a range
of stakeholders have to be carefully
understood when implementing the data
governance framework for use case 1.
Once the framework has been successfully
piloted, lessons learnt and best practices
can be gathered and used to further scale
the framework to encompass the 2-6 use
cases and related actors.
113
9
ANNEXES
114
9.1 EXAMPLES DATA GOVERNANCE POLICY
Many organizations have to date, already developed Data Governance Policies. The
following provides a selection outlining the different approaches and structures that
can be used:
115
9.4 DATA RETENTION POLICY TEMPLATE
COMPANY NAME
Street Address
City, State, and Zip
webaddress.com
VERSION HISTORY
Prepared
Title Date
by
116
TABLE OF CONTENTS
Purpose of the policy
Who is affected by the policy
Key terms
Applicable legal and business requirements
Procedures for ensuring data is properly retained
Procedures for ensuring data is properly destroyed
Procedures for ensuring data is properly archived
Exception process
How to respond to discovery, legal and audit requests
Responsibilities of those involved in data retention
Duties of the data retention team
Definition of temporary records
Definition of what records can be immediately deleted
117
KEY TERMS
TERM DEFINITION
118
APPLICABLE LEGAL AND BUSINESS REQUIREMENTS
EXCEPTION PROCESS
119
DUTIES OF THE DATA RETENTION TEAM (If applicable)
120
9.5 EXAMPLE DATA PROTECTION IMPACT
ASSESSMENT
The Office of the Data Protection Commissioner (ODPC) has developed guidelines
and templates on DPIA (how to identify risks arising from the processing of personal
data and how to minimize these risks).
The following template is an example of how to record a DPIA process and outcome.
The template should be filled out at the start of any major activity involving the use of
personal data or if significant changes are made to an existing process encompassing
personal data. The final outcomes should be integrated back into the activity plan.
Subject/title of DPO
Explain broadly what the project aims to achieve and what type of processing
it involves. You may find it helpful to refer or link other documents, such as a
project proposal. Summarize why you identified the need for a DPIA.
121
Step 2: Describe the processing
Describe the nature of the processing: how will you collect, use, store and the
delete data? What is the source of the data? Will you be sharing the data with
anyone? You might find it useful to refer to a flow diagram or any other way of
describing data flows. What types of processing identified are likely to involve
high risks?
Describe the scope of the processing: what is the nature of the data, and does
it include special category or criminal offence data? How much data will you
be collecting and using? How often? How long will you keep it? How many
individuals are affected? What geographical area does it cover?
Describe the context of the processing: what is the nature of your relationship
with the individuals? How much control will they have? Would they expect you to
use their data in this way? Do they include children or other vulnerable groups?
Are there prior concerns over this type of processing or security flaws? Is it novel
in any way? What is the current state of technology in this area? Are there any
current issues of public concern that you should factor in? Are you signed up
to any approved code of conduct or certification scheme (once any has been
approved)?
122
Describe the purposes of the processing: what do you want to achieve? What is
the intended effect on individuals? What are the benefits of the processing – for
you, and more broadly?
Consider how to consult with relevant stakeholders: describe when and how you
will seek individuals’ views – or justify why it is not appropriate to do so. Who
else do you need to involve within your organization? Do you need to ask your
processors to assist? Do you plan to consult information security experts or any
other experts?
123
Step 5: Identify and assess risks
Options to
Effect of Residual Measure
Risk reduce or
risk risk approved
eliminate risk
124
Step 7: Sign off and record outcomes
Comments:
Comments:
Source: https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-
protection-regulation-gdpr/accountability-and-governance/data-protection-impact-assessments/
125
9.6 AGRICULTURAL CODE OF CONDUCT
DEVELOPMENT TOOL
GODAN has created a tool to allow selecting of Clauses that might be relevant,
letting one easily produce a printable and savable Code of Conduct: GODAN Code
of Conduct KIT
126
9.8 EXAMPLE DATA SHARING AGREEMENT
The following data sharing template was developed by KALRO and can serve as a
good example of how to formulate such a legal agreement between two organizations:
PREAMBLE
AND
127
AND
RECITALS
WHEREAS, this MOU is based on principles of trust, equality, and mutual benefits;
OBJECTIVE
ARTICLES OF OBLIGATIONS
ARTICLE 1: OBLIGATIONS OF A
A will facilitate B to access its content in agricultural and livestock sectors during
128
the execution of specific Scope of Works (SOWs)
ARTICLE 2: OBLIGATIONS OF B
B will work within the established and/or agreed frameworks under A either
directly or through other A partners.
B will identify opportunities for collaboration with A that will advance the Parties’
shared interests.
Take all the necessary technical and organizational measures in the collection
and sharing of farmers’ personal data and be compliant with the Kenya Data
Protection Act 2019
ARTICLE 4: DURATION
This MOU shall become effective immediately upon signature by the appropriate
authorized representatives of each of the two institutions and shall remain valid
for a period of [months/years] subject to review and/or termination as may be
necessary by either party.
129
ARTICLE 5: TERMINATION
Either Party may terminate the MOU at any time upon notice of its decision at
least three (3) months in advance, without the right to any compensation for the
other Party. If, at the moment of the unilateral termination, specific tasks are
pending, they will continue until the end of the said specific task.
Upon termination, any gains or losses in the pursuance of the provisions of this
MOU shall be shared on mutually agreed ratios; failing such agreement, the
same shall be shared equally between the parties.
Termination of Cause: Each Party shall have the right to terminate this Agreement
or any SOW immediately upon a written notice in the event (a) the other Party
is in material breach of this Agreement or such SOW, and such breach is not
cured within thirty (30) days after receipt of written notice of the breach, or (b) if
the other Party makes a general assignment for the benefit of creditors, or files
a voluntary petition in bankruptcy, or if an involuntary petition in bankruptcy or
similar proceeding is filed against such other Party and is not dismissed within
ninety (90) days.
Survival: Articles 6, 11, and 12 shall survive the termination of this Agreement for
any reason, together with any accrued but unpaid payment obligations and any
other provisions which by their plain meaning are intended to survive.
ARTICLE 6: CONFIDENTIALITY
During the course of this MOU, either party may acquire confidential information
or trade secrets of the other. Confidential information of a party means all
information of whatever description, whether in permanently recorded form
or not, and whether or not belonging to a third party, which by its nature is
confidential or which the party identifies as confidential to itself.
130
Required to be disclosed by law; was or is independently developed by the
Receiving Party without use or reference to any information obtained from the
Disclosing, or any Party acting on behalf of the Disclosing Party, as demonstrated
by the Disclosing Party’s written records.
The Parties, together with their representatives, agents, and personnel, shall keep
confidential anything which the other designates as, or which might reasonably
be expected to be, confidential, unless otherwise required by a competent
authority.
ARTICLE 7: NON-EXCLUSIVITY
The Parties agree that the laws of Kenya shall apply to this MOU.
The parties undertake for themselves, their agents, and/or servants to observe
all established rules and regulations and to make further rules and regulations
to govern the use of facilities in the conduct of any or all of the functions of this
MOU. The parties shall use their best efforts to amicably settle all disputes arising
from or in connection with this MOU or interpretation hereof.
Any dispute between the parties as to matters arising pursuant to this MOU
which cannot be settled amicably within THIRTY (30) DAYS after receipt by one
party of the other party’s request for such amicable settlement may be submitted
to an Arbitrator mutually agreed upon by the parties for a decision in accordance
with the provisions of the Arbitration laws of Kenya.
131
ARTICLE 10: FORCE MAJEURE
Neither party shall be liable in damages or have the right to terminate this MOU,
for any delay or default in performing hereunder, if such delay or default is caused
by conditions beyond its control, including, but not limited to Acts of God,
Government restrictions (including the denial or cancellation of any operational
or other necessary licenses), wars, insurrections and/or any other cause beyond
the reasonable control of the party whose performance is affected.
The parties always agree to keep each other fully and properly indemnified
against all damages to or losses of any of their respective facilities resulting
from negligent acts of omission or commission of their respective agents and/or
servants.
A shall retain ownership of all intellectual property rights, title, and interest XX
that is not subject to this Agreement.
Organization’s IP
The Parties acknowledge and agree that all rights in and to any Intellectual
Property created or arising from the content creation and design other than
the Intellectual Property described in 12.1 & 12.2 shall be owned jointly by the
parties, and the revenue made from commercializing the co-created content
shall be shared equally.
Other IP agreements on research, e.g., Parties shall periodically review the results
of research projects to determine if any research findings, including processes
and methods, constitute patentable technology.
132
Other IP agreements on publications, e.g., Material for publication or presentation
from the joint collaborative activities, shall be submitted for clearance to A
to ensure that no patentable discoveries are published prior to protection by
patents.
In carrying out the functions of this MOU, each party will insure its own employees
and ensure that all adequate safety precautions are in place.
For:
Organization A
P.O. Box:
Fax:
E-mail:
133
For:
Organization B
P.O. Box:
Fax:
E-mail:
PROVIDED THAT a party may change its address, e-mail, and fax number for
communication hereunder by notifying the other party of such change pursuant
to this clause. Notice shall be deemed to have been received one day after
dispatch by electronic means and five days after dispatch by ordinary post.
134
ORAGNIZATION A ORGANIZATION B
In witness thereof, the representatives of the agreeing Parties are duly authorized
sign this MOU on the date indicated below:
(Signature) (Signature)
135
Further relevant links:
Attribute Description
136
Attribute Description
Data Mapping Tools help map data to and from various data sources. They automate
the mapping process or assist in mapping data seamlessly without much effort. There
are open-source Data Mapping Tools or purchasable Data Mapping Tools. Some of
the most commonly used tools are listed below:
Pactworld has developed a Field Guide for Data Quality Management, with an Excel-
based Routine Data Quality Assessment (RDQA) Tool, including instructions on how
to use it. The Guide also provides a Data Quality Management (DQM) SOP template
that can be customized to individual projects.the most commonly used tools are listed
below:
137
9.13 SOP DATA BREACH
1. PROCEDURE
Accidental loss
Theft
Human error, e.g., e-mails containing personal data sent to the
wrong person
Equipment failure
Damage, e.g., fire, flood
Malicious activity, e.g., hacking
If a data security breach occurs, the [organization] will respond to and manage the
breach effectively using a seven-part process.
1. Reporting a Breach
138
4. Notification of Breaches
6. Communication Plan
7. Review
1. Reporting a Breach
The DPA (2019) requires the [organization] to report breaches to the Office of the
Data Protection Commissioner (ODPC) within 72 hours of it being discovered.
It is therefore critical that once any member of staff or authorized third party
of the [organization] that has knowledge of a breach must contact the ODPC
immediately.
CA Centre
Waiyaki Way
G.P.O Nairobi
0796954269
139
All known details should be included in the initial reporting of the incident.
The immediate response will be to establish the nature of the breach and the
data involved, e.g., is it personal? How many individuals may be affected? This
will determine which Data Stewards of the [organization] must be notified.
The [organization’s] Data Protection Officer (DPO) must report all breaches to the
[organization’s] management team.
Once details of the breach are known, the DPO will liaise with relevant personnel
to contain the effect of the breach. This may include personnel from ICT (data
handlers, data stewards), Human Resources, Management Team, and on some
occasions, external suppliers.
The DPO and the data stewards will agree on what action must be taken to limit
the damage caused by the breach and, if possible, restore any lost data, e.g.,
backup tapes. Priority actions may include password changes, disabling swipe
access to secure areas within the buildings, or searching for lost equipment.
Once the breach has been contained, the DPO and data stewards will assess
risks associated with the loss of the data.
140
Considerations will be given to the following points:
4. Notification of Breaches
Where data loss has been confirmed, the [organization] is obliged to notify all
parties affected by the breach.
The DPO and data stewards will establish the identities of individuals whose
personal data has been compromised and agree on the correspondence to be
sent to each subject.
141
contact name, website link if they need further information
concerning the incident
The ODPC must be notified of all breaches where large numbers of individuals
are involved or where the consequences are serious, within 72 hours – the DPO
will be responsible for this correspondence.
The ODPC will not normally inform the media of a breach; however, they may
advise the [organization] to inform the media of the breach.
Should the ODPC advise that the media has been informed of the data breach,
the DPO will liaise with the Management Team of the [organization] to agree
on a statement which will be released to the press via the [organization’s]
Communications department, containing all relevant information pertaining to
the incident.
142
5. Evaluation and Response
While it is critical to contain and assess the risks of a breach, the [organization]
must evaluate events leading to the breach and the effectiveness of its response
to it. While carrying out an evaluation, the DPO will convene with department
specialists, a member of CMT, and if necessary, seek advice from the ODPC
regarding what measures the [organization] should and can take to avoid a
breach of a similar nature in the future.
The ODPC will evaluate the data breach and carry out their own investigation
into the surrounding circumstances, the nature and seriousness of the breach,
and the adequacy of any remedial action taken by the [organization] will be
assessed, and a course of action determined.
143
to prevent further breaches;
formal enforcement action turning such a requirement into a legal
obligation; or
where there is evidence of a serious breach of the DPA, whether
deliberate or negligent, the serving of a monetary penalty notice
requiring the [organization] to pay a monetary penalty of an amount
determined by the Commissioner.
6. Communication Plan
This procedure will be communicated to all staff via the [organization’s] Intranet.
7. Review
144
145
MINISTRY OF AGRICULTURE,
LIVESTOCK, FISHERIES AND CO-OPERATIVES
w w w. k ilimo .g o .ke /