L - E3b Privacy
L - E3b Privacy
Privacy
Personal Data vs Sensitive Personal Data Personal Data vs Sensitive Personal Data
◻ Personal data: any piece of information that ◻ Sensitive personal data aka as special category
someone can use to identify, with some degree data: a specific set of “special categories” that must
of accuracy, a living person. be treated with extra security.
◻ It is a subset of personal data that requires higher
e.g., name, address, phone number, email
levels of protection due to the potential harm if
address, date of birth, financial details, and exposed.
information related to work, education and ◻ Includes highly confidential information that, if
hobbies. mishandled, could cause significant damage e.g.:
◻ Personal data is also classed as anything that racial or ethnic origin; data related to a person’s
can affirm your physical presence somewhere. sex life or sexual orientation; and biometric data
(where processed to uniquely identify someone).
1
10/3/2023
◻ We want to keep some (if not all) areas of q When data was stored in paper form it
our lives private. was that much harder to work with.
◻ It is our right to do so.
q Today, massive amounts of data can be
◻ Though…
stored, accessed or moved/transferred at
There seems to be a difference in how much
we value our privacy, depending on which the click of a button.
generation we belong to. q Two areas of law become of interest:
■Social media generation q Data protection
■However, too, loyalty cards
q Freedom of information ...
I’dlike to see/know what information the Data Protection Act (2019), Europe’s General
government/public authorities have Data Protection Regulation (GDPR) and the
California Consumer Privacy Act (CCPA) in
■subject to certain exemptions
the United States.
2
10/3/2023
3
10/3/2023
◻ Other major concerns due to the ◻ Other major concerns due to the proliferation of the
internet:
proliferation of the internet: ◻ Social Media Privacy
◻ Online Privacy Posting personal information on social media
platforms can expose individuals to privacy risks.
Includes issues lik e tracking, data Users often reveal personal information without
col lec tion by w ebs it es an d o n l ine considering the consequences.
■ Sharing geolocation data on social media while
services, cookies, and the use of on vacation.
personal information for targeted ■ Posting vacation plans on social media can
make you a target for burglars.
advertising.
4
10/3/2023
5
10/3/2023
Mass surveillance
Scope creep mass surveillance
The Panopticon
Mass Surveillance
◻ The Panopticon
◻ La te 1 8th Cen t ury i de a by J er emy B e nt ha m ( En gl i sh
philosopher and social theorist).
One invisible warden in a central tower watches many
individuals separated from each other.
To help manage correctional facilities by inducing good
behaviour
■ the more people are watched, the better they behave.
■ the prisoners do not know who is being watched, thus
they modify their behaviour accordingly.
◻ Inspired George Orwell’s big brother’s all seeing eye in
Prison San Vittore – Milan (built in 1880)
“1984”. 24
Source: thefunambulist.net
6
10/3/2023
◻ Justification? Insidious
(like the panopticon)
■If we feel we are probably being
To curb terrorism watched we modify our behaviour
To tackle crime … accordingly.
◻ Provides information for investigation
◻ How? … purposes.
7
10/3/2023
8
10/3/2023
9
10/3/2023
10
10/3/2023
◻ Argued such a list violated the q January 2017, CA announced their plan to
Constitution’s: implement a device management system:
◻ Article 31 q Ostensibly to identify fake and stolen devices.
11
10/3/2023
Surveillance Activities
Data Processing vs Privacy
Other Examples: Huduma Number
q Once more, massive amounts of personal ◻ The constitution enshrines our right to
data was being collected, centralised and privacy.
shared. ◻ But pre-November, 2019 there was
12
10/3/2023
◻ The Kenyan Dat a Pro tection Bi ll ◻ Yet all this data about an individual
(2019) was the latest version. stored in one database.
◻ At long last (November 8, 2019) the ◻ The problem being there was no law
Surveillance Activities
Other Examples: Huduma Number (cont) … India
◻ Also: ◻ The Aadhaar number was initially
◻ Is the practice and spirit of it such
13
10/3/2023
14
10/3/2023
15
10/3/2023
government from abusing this Basically, do what you want, when you
privilege wa nt, wi tho ut hin drance / feel i ng
even if fighting terrorism. watched.
◻ The information / digital age is powered by ◻ We have little/no ability to control what is
information d o n e to o u r da ta i f t h e r e ar e n o l e g a l
◻ Technological advances have led to massive mechanisms in place.
amounts of our data being out there. ◻ Your digital persona can easily affect your
◻ Corporations and governments worldwide physical persona negatively
hunger for this information Persuasion through ads
This data is sorted and you are profiled based on Harassment e.g. cyberbulling/stalking
16
10/3/2023
◻ Information is a priceless commodity that ◻ Big data firms seem to have more power than
we give out for free. governments.
◻ Governments want to regain their power
◻ Why not sell it?
◻ A country may have exponential growth in e-
Watch Stuart Lacey’s TEDxBermuda talk commerce (as Kenya does).
titled: “The Future of Your Personal Data - Manycitizens run their businesses on FB, Instagram,
Privacy vs Monetization” e-commerce platforms like Jumia and Amazon.
https://www.youtube.com/watch?v=JIo- ◻ No legislation to protect data means people’s
V0beaBw sensitive data is online but unprotected.
17
10/3/2023
Legal
Ethical
Human rights
Data Protection
Legal Issues
18
10/3/2023
◻ When you opt in, one of the T&Cs is: ◻ How and why did private entities have access
You allow them access to the information the to such potent data?
Integrated Population Registration System ◻ B e c au se the r e wa s n o l e ga l f r am ew o r k
(IPRS) system holds about you. governing the IPRS.
■IPRS was developed for the Kenyan
◻ Th e Reg ist ration of Pers ons Act all ows
collection of data but doesn’t discuss it’s
government (NOT private corporates!!).
protection.
◻ Ditto other businesses with apps that offer ◻ The government should not serve private
credit services … business interests; it should serve the citizens.
◻ With access even to DNA info? AnonPlus who placed their manifesto on the
homepage
◻Can I be tracked using my
Th ey prom i se d to “d ef en d free d om o f
eye/facial recognition data from information, freedom of the people and
emancipation of the latter from the oppression
all the CCTV cameras? of media”.
19
10/3/2023
Data Protection
Ethical Issues
collection?
Is the passing of amendments to certain laws
done with transparency / accountability /
integrity in mind?
20
10/3/2023
◻ How ethical are the following: q How ethical are the following:
Treating humans as their data (am I my data)?
◻ The state having considerable
q
q “ok” and profitable for businesses but…
insight into our lives? q … governments actions should not be driven by
commercial interests/profit margins
◻ The state enabling others (private
q Cambridge Analytica – data used to breach
corporations/individuals) to have the democracy of at least two developed
insight into our lives nations.
e.g. through security breaches)? q How sovereign are we?
Data Protection
Human Rights Issues
Right to privacy
Data Protection q
21
10/3/2023
Right to privacy
◻
◻ cf human right.
Huduma namba;
p o l i t i c al SM S s s e n t t o y o u r “ pr i v a te ”
cellphone number
22
10/3/2023
23
10/3/2023
q Mass surveillance implies data on individuals q When individuals are under constant surveillance, there
is gen erat e d, col lect ed and pro cesse d may be a presumption of guilt or suspicion, shifting the
burden of proof from the prosecution to the defense.
re gar dl ess of t he i r be i ng i nv o l ve d (o r
q Mass surveillance can create an environment where
suspected to be involved) in criminal activities. individuals are treated as potential suspects until they
q This “distorts the burden of proof principles, can prove their innocence.
leads to an unaccountable increase in power, q This chilling effect on freedom of expression
and has a chilling effect on individual action q Knowing that they are being monitored, individuals
and the exercise of free speech.” may self-censor their online activities and
communications out of fear of being targeted or
(Kiprono, 2018) ... labeled as a potential threat.
24
10/3/2023
What should a DPL look like? What should a DPL look like?
25
10/3/2023
Players Players
26
10/3/2023
Players Players
◻ Basically, a data controller determines why and ◻ Example (cont...):
how personal data should be processed while
◻ a data processor carries out these tasks on behalf of
◻ The uni is the data controller and
the controller. ◻ The security firm is the data processor.
27
10/3/2023
◻ The EU has a comprehensive data privacy law known ◻ Severe and designed to be effective, proportionate
as the General Data Protection Regulation (GDPR). and dissuasive for each individual case.
◻ A data subject has rights under the GDPR that aim to ◻ For especially severe violations, listed in Article 83 (5)
protect their privacy and right to self-determination. GDPR, the fine framework can be up to 20 million
◻ The GDPR euros, or up to 4% of the organisation’s total global
q enhances individuals’ control and rights over their
turnover of the preceding fiscal year, whichever is
higher.
personal information
q simplifies regulations for international business.
◻ Less severe violations in Article 83 (4) GDPR sets forth
fines of up to 10 million euros, or up to 2% of the
q governs the transfer of personal data outside the
organisation’s entire global turnover of the preceding
EU and the European Economic Area (EEA). fiscal year, whichever is higher.
28
10/3/2023
29
10/3/2023
◻ The right to privacy is enshrined in Article ◻ Article 2: should Kenya sign/ratify international
31 of the Kenyan constitution: treaties/ conventions they become part of the
Kenyan domestic law.
Every person has the right to privacy.
◻ Kenya is a signatory to
This includes the right not to have the Universal Declaration of Human Rights (UDHR)
■their person, home or property searched; ◻ and has ratified
■their possessions seized;
the International Covenant on Civil and Political
■information relating to their family or private Rights (ICCPR)
affairs unnecessarily required or revealed; or ◻ They include privacy rights.
■the privacy of their communications infringed.
(Kenyan Constitution: Chapter Four, Part 2, Article 31)
30
10/3/2023
31
10/3/2023
32
10/3/2023
◻ Data Controllers and Processors must: q Law to safeguard citizens’ personal data.
q Sets out comprehensive provisions for the collection,
process data lawfully;
use, storage, and handling of personal data.
minimise collection of data; q seeks to promote and protect the privacy of
restrict further processing of data; personal data and ensure that data controllers,
data processors, and data subjects adhere to the
ensure data quality; highest standards of data protection.
e s t a b l i s h a n d m a i n t a i n s e c u r i t y q sets out stringent requirements for data controllers
safeguards to protect personal data. on what to do with the personal data they collect...
The Data Protection Act of 2019 The Data Protection Act of 2019
q They must provide data subjects with a notice explaining ◻ The Data Protection Act also gives data
how their data will be collected, processed, and stored. subjects the right to access their personal data
q They must include details on the purpose of the data held by data controllers.
processing, the legal basis for the data processing, and
the party to whom the data will be disclosed. ◻ Data subjects can request data controllers to
q Data controllers must also obtain explicit consent from provide them with a copy of their personal
data subjects before they can process their personal data, and data controllers must respond to
data. these requests within thirty days.
q They must ensure that they only collect and process data ◻ Data subjects can also request data controllers
that is necessary for the purpose they seek to achieve. to rectify, delete, or restrict the processing of
their personal data.
33
10/3/2023
The Data Protection Act of 2019 The Data Protection Act of 2019
Data controllers must comply with these requests, except
◻
under specific circumstances set out in the Act. ◻ The act establishes the office of the Data
◻ The Act also provides for the protection of data subjects’ Protection Commissioner, who is
rights against unauthorized processing, loss of data, or
destruction of data. responsible for overseeing and enforcing
◻ Data controllers must take appropriate measures to data protection regulations in Kenya.
safeguard personal data, including measures to prevent
unauthorised access, modification, disclosure, or destruction ◻ Th e Commiss ion er has th e powe r t o
of personal data.
◻ Data controllers must also put in place adequate technical investigate data controllers and
and organisational measures to ensure the security of processors suspected of violating data
personal data.
protection laws and to impose sanctions on
violators of the law.
The Data Protection Act of 2019 The Data Protection Act of 2019
q Regulates the processing of personal data q You have the right to know how your information
is handled.
and information. q You have the right to request your personal data
q GDPR principles informed the bill on the be deleted/edited if it is inaccurate.
q The right to data portability is enforced.
governance of this information
q A data subj ects can obt ain dat a th at a data
q How it is handled, stored and shared. controller holds on them and reuse it for their own
purposes.
q Illegal processing of personal data is q You now have the right to refuse an organisation to
punishable by law. transfer your personal data to another organisation.
q Should be a relief to cellphone users.
q Upto 3,000,000/= fine or a maximum of 2
years in jail.
34
10/3/2023
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
◻ All data controllers/data processors must ◻ The following conditions ensure that cross-border data
ensure at least one copy of personal data to processing is carried out with proper safeguards and
which the Act applies is stored on a server or consideration for data subjects' rights and privacy.
data centre located in Kenya 1. Adequate Protection
2. Consent
◻ Cross-border processing of sensitive personal
data is prohibited 3. Legal Obligations
4. Vital Interests
the transfer of personal data to foreign countries or
international organisations is only allowed when 5. Public Interest
ce rtain cond it ions are met or unde r cert ai n 6. Legal Claims
circumstances specified in the Act...
35
10/3/2023
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
Example:
◻ Legal Obligations: if such transfers ◻
36
10/3/2023
2.4 Transfer of Personal Data Outside Kenya 2.4 Transfer of Personal Data Outside Kenya
◻ Public Interest: if the data transfers are ◻ Legal Claims: Transfers of data may be
necessary for the performance of a task allowed if they are necessary for the
carried out in the public interest or in the establishment, exercise, or defense of legal
claims.
exercise of official authority.
E.g. a law firm processes personal data
e.g., to conduct a public health survey
without consent to pursue a legal claim on
during a disease outbreak. behalf of a client in a court case.
This is done in the public interest to This processing is necessary for the
protect the health of the population. establishment, exercise, or defense of legal
claims ...
37
10/3/2023
38
10/3/2023
◻ The Act requires that any person who acts as a ◻ Cross-border processing of sensitive
data controller or data processor must be
personal data is prohibited and only
registered with the Data Commissioner.
... and renew their registration every 3 years.
allowed when certain conditions are
◻ Every data controller or data processor is
met or under certain circumstances
required to ensure the storage, on a server or specified in the Act.
data centre located in Kenya, of at least one ◻ In case of non-compliance with these
serving copy of personal data to which the Act
applies.
regulations, penalties may be
imposed.
The Kenyan Data Commissioner’s Roles The Kenyan Data Commissioner’s Roles
39
10/3/2023
The Kenyan Data Commissioner’s Roles The Kenyan Data Commissioner’s Roles
The Kenyan Data Commissioner’s Roles The Kenyan Data Commissioner’s Roles
private entities with a view to evaluating processing of personal data and ensure that
the processing of personal data. there is no significant risk or adverse effect of
any developments on the privacy of individuals.
40
10/3/2023
41
10/3/2023
42