NDPC International Journal of Data Privacy and Protection
NDPC International Journal of Data Privacy and Protection
Editor in Chief
Dr. Vincent Olatunji, CDPO, CPPPS, FIIM
Editorial Team
Tolulope Pius-Fadipe, PhD, CDPO
Tokunbo Smith, CDPSE, FIIM, FITD, FIMC, FOSHA (UK)
Olayinka Oyebanji, CDPO
Ibukuoluwa Owa, Esq
Seyi Dare-Davids, CDPO
Alexander Onwe, Esq.
Kayode Odekunle
Facebook: @ndpcngr
Twitter: @ndpcngr
Instagram: @ndpcnigeria
LinkedIn: Nigeria Data Protection Commission - NDPC
YouTube: Nigeria Data Protection Commission
Website: www.ndpc.gov.ng
Printed in Nigeria by
Amatt Brill Impressions Ltd.
Block A2, Suite & Commerce Plaza,
Garki, Abuja.
Editorial Note v
Abstract
This paper explores the implementation of data protection laws in
Nigeria, focusing on the progress, innovations, and challenges
since the introduction of the Nigeria Data Protection Act, 2023
(NDP Act). As data protection becomes increasingly vital in the
digital age, Nigeria has taken significant steps to safeguard per-
sonal information of citizens despite obvious challenges. The pa-
per examines the trajectory leading to the NDP Act, establishment
and role of the Nigeria Data Protection Commission (NDPC), and
the public-private-partnership model known as the Data Protec-
tion Compliance Organization (DPCO). It highlights the achieve-
ments of the NDP Act while identifying key hurdles, including legal
ambiguities, technological infrastructure gaps, and low public
awareness. Finally, the paper provides recommendations to
strengthen data protection practices in Nigeria, such as enhancing
stakeholder awareness, capacity building, improving legal frame-
works, and addressing technological barriers.
Global:
1. UN Universal Declaration of Human Rights (1948): Article 12
establishes the right to privacy, providing a universal basis
for protecting personal data. The NDP Act reflects this by
recognizing data privacy as a fundamental human right.
2. Convention 108 and 108+: The Council of Europe’s Conven-
tion for the Protection of Individuals with regard to Auto-
matic Processing of Personal Data, and its modernized ver-
sion. Convention 108+ for the protection of individuals with
regard to the processing of personal data, have also influ-
enced Nigeria’s approach. These agreements prioritize the
protection of personal data while facilitating data flows
across jurisdictions. Nigeria’s NDP Act reflects this focus by
balancing data protection with fostering safety in the face
of technological advancements.
3. EU Data Protection Directive (1995): Established compre-
hensive guidelines for protection of individuals with regard
to the processing of personal data and on the free move-
ment of such data within the European Union.
Africa:
1. Malabo Convention (2014): The African Union’s Convention
on Cyber Security and Personal Data Protection, known as
the Malabo Convention, encourages African nations to
adopt robust data protection laws to facilitate trust, eco-
nomic integration, and cross-border data flows.
2. African Union Data Policy Framework (2022): A broader in-
itiative encouraging harmonization of data protection
standards across the continent to promote economic inte-
gration and trust.
West Africa:
ECOWAS Supplementary Act on Personal Data Protection (2010):
This regional framework requires Economic Community of West
African States (ECOWAS) member states to establish national legal
frameworks for the protection of privacy of data relating to the
collection, processing, transmission, storage, and use of personal
data.
West Africa
West Africa has emerged as a leader in data protection adoption
on the continent. Nigeria, Ghana, and Côte d’Ivoire have imple-
mented comprehensive frameworks that align with regional and
Southern Africa
Southern Africa showcases a strong legislative presence. South
Africa’s Protection of Personal Information Act (POPIA) stands out
as one of the most comprehensive frameworks on the continent.
Similarly, Zambia’s Data Protection Act provides robust measures
to protect personal data.
East Africa
East Africa presents a mixed landscape. Kenya has developed a
robust data protection framework, which serves as a model for
the region. Other countries, however, are at various stages of de-
veloping or implementing their laws.
Central Africa
Central Africa lags in the adoption of data protection legislation.
Only a few countries, such as Chad and Gabon, have enacted laws,
leaving significant gaps in the region's data governance.
North Africa
Several North African countries, including Morocco and Tunisia,
have established comprehensive data protection frameworks.
Unregulated Jurisdictions
Despite the progress made, 17 African countries, including Came-
roon, Mozambique, Namibia, and the Democratic Republic of Con-
go, still lack formal data protection laws. This legislative gap pos-
Core Activities:
1. Registration of Data Controller/Processor.
2. Training and awareness.
3. Conducting DPIAs.
4. Conducting audits to evaluate data protection measures.
5. Filing annual audit reports with the Nigeria Data Protection
Commission (NDPC).
2. Human Capital
i. Trained over 1,500 Data Protection Officers in both public
and private sectors.
ii. Conducted over 140 training programmes with over 55,000
beneficiaries.
iii. Creation of over 30,123 new jobs for professionals in the
ecosystem.
iv. Licensed the Institute of Information Management (IIM) to
certify data protection professionals.
v. Ongoing certification process for 500 Data Protection Of-
ficers.
Ecosystem Growth
11. Challenges
Despite the progress made by the Nigeria Data Protection Com-Co
mission (NDPC) in advancing data protection
ction initiatives, several
challenges remain in the effective enforcement of data privacy
laws. These challenges include:
1. Lack of Awareness and Education
One of the major obstacles to data protection in Nigeria is
the lack of widespread awareness and educationucation about da-
d
ta privacy rights and obligations. Many organizations, as
well as individuals, are still unaware of their roles and re-r
sponsibilities under the Nigeria Data Protection Act (NDP
Act), making it difficult to foster a culture of compliance.
12. Conclusion
In conclusion, the NDPC’s efforts are integral to the development
of a trustworthy, secure, and sustainable data protection envi-
ronment in Nigeria, positioning the country as a leader in data
protection and privacy within Africa and on the global stage.
Through the Nigeria Data Protection Act (NDP Act) 2023, the Com-
mission has established a comprehensive regulatory framework
that balances innovation with privacy, ensuring that individuals’
rights are protected while supporting the country’s digital trans-
formation. The Commission’s key achievements reflect its com-
mitment to fostering a robust data protection ecosystem.
However, the journey ahead remains complex. The NDPC contin-
ues to face challenges such as limited resources, a need for great-
er public awareness, rapid technological advancements, and
evolving cybersecurity threats. These obstacles underscore the
importance of continued collaboration, capacity building, and in-
vestment in both human capital and technological infrastructure.
Moving forward, the NDPC’s success will depend on its ability to
address these challenges while maintaining its focus on its mis-
sion to protect individuals' data rights, promote compliance
across all sectors, and foster global cooperation. With continued
support and a focus on innovation, the NDPC will play a crucial
role in shaping Nigeria’s data privacy future.
Abstract
In recent years, the rapid expansion of the Internet of Things (IoT)
has brought unprecedented opportunities for innovation, while
also raising significant concerns about data privacy and protec-
tion. In the connected world of IoT, vast amounts of personal data
are collected, transmitted, and processed through AI-powered
systems. These interconnected devices, coupled with AI, allow for
enhanced consumer targeting, decision-making, and automation.
However, these advancements also escalate risks, as AI models
often process large datasets in ways that are complex to regulate.
Embedded AI systems in IoT environments can inadvertently in-
fringe on privacy rights by gathering sensitive personal informa-
tion from diverse sources or utilizing data in ways that exceed in-
dividuals’ privacy expectations.
This paper examines the challenges AI poses to data privacy with-
in IoT ecosystems, highlighting the critical need to balance tech-
nological benefits with robust privacy safeguards. It further ex-
plores potential measures organizations and regulators can im-
plement to protect data in this rapidly evolving landscape. Ulti-
mately, the paper advocates for a harmonized approach that leve-
rages the transformative power of AI in IoT while safeguarding in-
1. Introduction
In the rapidly evolving digital landscape, the Internet of Things
(IoT) is revolutionizing the way devices, systems, and individuals
interact, creating a seamlessly connected world. At the heart of
this ecosystem lies personal data, now frequently termed the
"new currency" of the digital economy (Zuboff). As billions of in-
terconnected devices—from smartphones to smart homes—
continuously collect and transmit data, the volume of information
available for analysis has surged exponentially (Kshetri 32). This
unprecedented scale of data collection offers significant oppor-
tunities for innovation and efficiency, particularly when harnessed
by Artificial Intelligence (AI) systems (Brynjolfsson and McAfee).
AI, with its capacity to process and analyze vast datasets in real-
time, has emerged as a key enabler within the IoT ecosystem
(Arntz, Melanie, et al. 5). It allows platforms to derive insights,
predict behaviors, and automate decisions with a precision that
was previously unimaginable (Calo 399). However, while AI prom-
ises to unlock new capabilities and optimize IoT functionalities, it
also introduces serious concerns regarding data privacy. The abili-
ty of AI to infer, aggregate, and reclassify non-personal data into
identifiable personal information raises ethical and legal chal-
lenges, particularly around the protection of individuals' privacy
rights (Solove).
Works Cited
Adewale, Funmi. “Cybersecurity in AI-IoT Systems: Emerging Threats and Safe-
guards.” Nigeria Tech Journal, vol. 7, no. 2, 2024, pp. 23-45.
Ahmed, Sofia. “Algorithmic Fairness: Challenges in AI Systems for IoT Devices.”
Ethical AI Review, vol. 8, no. 3, 2023, pp. 112-128.
Anderson, Richard. “Privacy by Design in AI-IoT Development: A Best Practices
Guide.” IoT Privacy Review, vol. 11, no. 3, 2024, pp. 68-85.
Arntz, Melanie, et al. “The Risk of Automation for Jobs in OECD Countries: A Com-
parative Analysis.” OECD Social, Employment and Migration Working Papers,
no. 189, 2016, pp. 5–40.
Barnes, Michael. “Black Box Algorithms in IoT Systems: Legal and Ethical Issues.”
Journal of Technology and Society, vol. 16, no. 1, 2023, pp. 14-33.
Bashir, Khalid. “The Threat of AI Re-identification in IoT Systems.” Cybersecurity
and AI Journal, vol. 10, no. 2, 2024, pp. 33-49.
Brown, Emily. “Natural Language Processing in IoT Devices: Applications and
Challenges.” Journal of AI Applications, vol. 11, no. 3, 2023, pp. 45-67.
Brynjolfsson, Erik, and Andrew McAfee. “The Second Machine Age: Work, Progress,
and Prosperity in a Time of Brilliant Technologies”. W.W. Norton & Company,
2014.
Calo, Ryan. “Artificial Intelligence Policy: A Primer and Roadmap.” Utah Law Re-
view, vol. 2017, no. 5, 2017, pp. 399-419.
Abstract
This paper critically examines the limitations of Nigeria’s consent-
based data protection framework under the Nigeria Data Protec-
tion Act 2023 (NDP Act or the Act) and proposes a transition to a
harm-accountability model. The consent-based approach, rooted
in rational choice theory, assumes that individuals provide in-
formed and rational consent for their data to be processed. How-
ever, behavioural economics and empirical research challenge
this assumption, citing cognitive biases, informational asymmetry,
and the complexities of digital decision-making. These flaws un-
dermine consent as an effective mechanism for privacy protec-
tion. Using a mixed-methods approach—integrating legal critique,
theoretical exploration, and stakeholder surveys—this paper high-
lights the inadequacies of the current framework. It proposes a
harm-accountability model, emphasising data controllers' accoun-
tability through compliance and proactive risk management, and
strict penalties for breaches, regardless of user consent. This
model addresses the challenges of Nigeria’s growing digital econ-
omy. To operationalise this framework, the paper recommends
legislative reforms and policy measures to strengthen accounta-
bility and enhance data subject protection.
1. Introduction
The exponential growth of digital technology has transformed how
personal data is collected, processed, and shared. In developing
economies such as Nigeria, data privacy laws often rely on con-
sent-based frameworks to safeguard individuals' digital rights.
The NDP Act mandates consent in specific high-risk scenarios,
such as the processing of sensitive data, direct marketing, or
cross-border data transfers, to ensure user control. However, the
consent-based model assumes that individuals can fully under-
stand and rationally evaluate the implications of their decisions.
Rooted in contract law, it treats privacy as a transaction where
individuals freely accept or reject terms.
In practice, users encounter complex privacy agreements, mani-
pulative "dark pattern" interfaces, and "take-it-or-leave-it" con-
sent options that undermine meaningful control. Furthermore, the
ubiquity of digital services makes refusing consent impractical,
often excluding users from essential online functions. Behavioural
economics further exposes flaws in this model, demonstrating
how cognitive biases, incomplete information, and environmental
pressures impair decision-making.
A recent survey of 200 Nigerian internet users revealed significant
gaps in understanding and engagement with consent mechanisms.
Despite expressing privacy concerns, users frequently remain un-
aware of or unable to comprehend the terms they accept. This pa-
per advocates for a harm-accountability model to complement
consent in situations where it is required. By shifting the focus
from procedural compliance—where obtaining consent is treated
as an end in itself—to outcome-based accountability, this model
2 Literature Review
This review examines the theoretical underpinnings of consent-
based data protection frameworks and their critiques, focusing on
rational choice theory, behavioural economics, regulatory res-
ponses, and the localised challenges in Nigeria.
3 Methodology
This study employed a mixed-methods approach to examine the
limitations of consent-based data protection frameworks in Nige-
ria and evaluate the potential for a harm-accountability model.
The research design incorporated both quantitative and qualita-
tive elements to provide comprehensive insights into privacy de-
cision-making behaviours and attitudes.
6 Conclusion
This paper has examined the limitations of consent-based data
protection frameworks in Nigeria and proposed a shift toward a
Works Cited
Acquisti, Alessandro, and Jens Grossklags. "Privacy and Rationality in Individual
Decision Making." IEEE Security & Privacy, Vol. 3, no. 1, 2005, pp. 26-33.
European Union. "General Data Protection Regulation." EUR-Lex, 27 Apr. 2016,
eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679.
California State Legislature. "California Consumer Privacy Act." California Legisla-
tive Information, 2018, oag.ca.gov/privacy/ccpa.
Federal Republic of Nigeria. "Nigeria Data Protection Act." Nigerian Government,
2023, cert.gov.ng/ngcert/resources/Nigeria_Data_Protection_Act_2023.pdf.
Simon, Herbert A. "A Behavioral Model of Rational Choice." The Quarterly Journal
of Economics, Vol. 69, no. 1, 1955, pp. 99-118.
Solove, Daniel J. "Privacy Self-Management and the Consent Dilemma." Harvard
Open-Ended Questions
12. In your experience, what challenges do you face when
trying to understand privacy terms on websites or apps?
13. What changes would make you feel more in control of your
data privacy online?
Abstract:
This paper examines the concept of data embassies as a revolu-
tionary solution to the challenges of cross-border data gover-
nance in an increasingly digitalized world. Drawing parallels with
traditional diplomatic missions, data embassies represent secure,
extraterritorial data centers that operate under the jurisdiction of
their home countries while being physically located abroad. Esto-
nia's pioneering implementation of a data embassy in Luxem-
bourg serves as a case study, demonstrating how this framework
can effectively address the fundamental tension between national
sovereignty and global connectivity in data management while
facilitating secure cross-border data flows.
The study proposes the development of a comprehensive interna-
tional treaty to address critical challenges facing the widespread
adoption of data embassies, including concerns over national so-
vereignty, variations in privacy standards, and the need for robust
international oversight. This treaty would establish global privacy
standards, mandate independent audits, and create accountabili-
ty mechanisms for data breaches. While data embassies represent
a transformative approach that could revolutionize how countries
manage and protect digital assets, their successful implementa-
3. Historical Context
The concept of data embassies emerged in the backdrop of in-
creasing cyber threats and the evolving landscape of data sove-
reignty. It was prominently initiated by Estonia, which established
the first data embassy in Luxembourg in response to significant
cyberattacks in 2007. These attacks were triggered by political un-
rest following Estonia's decision to relocate a Soviet-era war me-
morial, highlighting the nation's vulnerability to digital threats
that could disrupt essential governance functions and services
reliant on digital infrastructure (Shrivastava and Lakra, 2024).
The concept of data embassies represents a transformative ap-
proach to addressing the legal complexities of cross-border data
governance. By borrowing from the principles that govern diplo-
matic missions—where embassies are considered the sovereign
territory of the sending nation regardless of their physical loca-
tion in a foreign country—data embassies create a framework
Works Cited
“Data embassies in India: The future of data diplomacy and privacy.” One Young
India, www.oneyoungindia.com/cuet-and-upsc-general-studies-notes/data-
embassies-in-india-the-future-of-data-diplomacy-privacy. Accessed 27 Dec.
2024.
Basu, Arindrajit [Datasphere Initiative]. “How data embassies can promote data
security for all.” Medium, 3 Aug. 2023, medium.com/@thedatasphere/how-
data-embassies-can-promote-data-security-for-all-57bc523146b7.
Court of Justice of the European Union. Schrems II: Judgement in Case C-311/18,
Data Protection Commissioner v Facebook Ireland Ltd and Maximillian
Schrems, 16 July 2020, https://curia.europa.eu/jcms/jcms/j_6/en/.
Culver, Clifford. Data Sovereignty: The Impact of Digital Borders on the Cloud.
Palgrave Macmillan, 2020.
Greenleaf, Graham. Asian Data Privacy Laws: Trade and Human Rights Perspec-
tives. Oxford University Press, 2014, https://academic.oup.com/ijlit/article-
abstract/23/3/322/783852?redirectedFrom=fulltext
India Press Agency. “India Emerges as a Global Center for Data Embassies.”
Newspack Live!, 21 Sept. 2024, live.ipanewspack.com/2024/09/india-
emerges-as-global-center-for-data.html.
ISO/IEC 27001. Information Security Management Systems — Requirements. In-
ternational Organization for Standardization, 2013.
Kharazishvili, Yu.M. & Kwilinski, Aleksy. (2023). Methodology for Determining the
Limit Values of National Security Indicators Using. Virtual Economics. 5. 7-26.
10.34021/ve.2022.05.04(1).
Kolessova, Anna-Maria " Estonia's Data Embassy Initiative: A Framework for
Building Cyber Resilience in Other Countries." (Masters Thesis) Tallin Univer-
sity of Technology 2023,
https://digikogu.taltech.ee/et/Download/dae125ad-ef19-4f5b-b087-
305bdfc2aed2.
Meyer, Thiébaut. “Data embassies: Strengthening resiliency with sovereignty.”
Google Cloud Blog, 12 Nov. 2022, cloud.google.com/blog/products/identity-
Abstract
Data breaches pose a significant and escalating threat in today’s
digital world, often compromising personal, financial, and organi-
sational information with sometimes severe outcomes such as
privacy violations, reputational damage, identity theft, financial
loss and national security risks. As cyber-attacks grow in frequen-
cy and sophistication, robust strategies are required to avoid or
mitigate their impact. The connection between data privacy and
protection and the critical imperative to prevent data breaches is
reflected in the Nigeria Data Protection Act (NDP Act), which man-
dates data controllers and processors to implement measures en-
suring the security, integrity, and confidentiality of personal data,
protecting against unauthorised access, misuse, and loss. Prevent-
ing data breaches is a critical element of data protection and an
effective data protection regime must be focused on preventing,
responding to and remediating data breaches. This article ex-
amines the types and causes of data breaches, principles of effec-
tive management, and preventive measures aligned with legal and
best practice standards. It also highlights the importance of post-
breach remediation, continuous improvement, and incident learn-
ing to safeguard organisations and stakeholders from the devas-
7. Conclusion
The increasing sophistication of cyber-attacks necessitates a ro-
bust and proactive approach to data breach management. Design-
ing an effective data breach management and response plan re-
quires a comprehensive approach that cuts across the identifica-
tion of all touchpoints and processes where a data breach may
occur, implementation of prevention measures for the identified
areas of breach, mode of response where there has been a
breach, and deployment of remedial steps to address the breach
and prevent a recurrence. This significantly reduces an organisa-
tion’s risk of exposure.
Prevention starts with robust technical, operational and cyberse-
curity measures, employee training, and proactive risk assess-
Works Cited
Aro, Busola “Investigation Ongoing – Bosun Tijani Speaks on Alleged NIMC Data
Breach” The Cable, 2024, https://www.thecable.ng/investigation-ongoing-
bosun-tijani-speaks-on-alleged-nimc-data-breach/ accessed 16 November
2024
Cheng, Long, et al “Enterprise Data Breach: Causes, Challenges, Prevention and
Future Directions” Wiley Interdisciplinary Reviews: Data Mining and Know-
ledge Discovery. vol 2017 pp. 1-14, doi: 10.1002/widm.1211
“Cyber Security Breaches Survey 2024” Department for Science, Innovation and
Technology, 2024, https://www.gov.uk/government/statistics/cyber-
security-breaches-survey-2024/cyber-security-breaches-survey-2024 ac-
cessed 08 November 2024
“Data Breach Response: A Guide for Business” Federal Trade Commission, 2021,
“Data Breach Response: A Guide for Business” Federal Trade Commission,
2021, https://www.ftc.gov/business-guidance/resources/data-breach-
response-guide-business accessed 16 November 2024
De Groot “The History of Data Breaches” Digital Guardian, 2019, J. De Groot, “The
History of Data Breaches, Digital Guardian” 2019 [Online] available at
https://digitalguardian.com/blog/history-data-breaches accessed on 07
November 2024
DeVoe, Charles and Shawon Rahman “Incident Response plan for a Small to Me-
dium Sized Hospital” International Journal of Network Security & its Applica-
tions vol. 5, no. 2, 2013, 1-20, ResearchGate, doi:10.5121/ijnsa.2013.5201
Abstract
The proliferation of digital technologies has introduced unprece-
dented challenges to data privacy, requiring innovative strategies
to foster privacy-conscious behaviors. While traditional privacy
awareness campaigns often fail to resonate due to vague messag-
ing and one-size-fits-all approaches, creative advocacy offers a
transformative solution. This paper explores how innovative me-
thods such as interactive campaigns, digital storytelling, and ga-
mification can bridge the gap between complex privacy concepts
and practical understanding. Drawing on theoretical models like
the Health Belief Model and Social Cognitive Theory, it highlights
how creative advocacy enhances user engagement, contextualizes
privacy risks, and promotes sustainable behavior change. Case
studies demonstrate its effectiveness in diverse contexts, particu-
larly for audiences with varying levels of digital literacy. The paper
also examines the relationship between awareness and privacy-
conscious behaviors, emphasizing the need for targeted, relatable,
and culturally sensitive initiatives to address the evolving digital
ecosystem. Finally, it argues that creative advocacy is not merely
an alternative but a necessary approach to fostering a culture of
data protection in the digital age.
2. Literature Review
Awareness and education are crucial first lines of defense against
cybercrimes and privacy violations (Eluwah 3). Over the past dec-
ade, research on factors influencing privacy behavior has grown
significantly. Researchers, software developers, information secu-
rity providers, and individuals have explored ways to enhance the
privacy behaviors of ICT users. While ICT users claim to value their
data privacy, they often disclose significant amounts of personal
information when using internet-connected devices (Paspatis and
Tsohou 396-415).
Tilburg University underscores the importance of privacy aware-
ness, stating, “Privacy is a very topical issue, increasingly so. Stu-
dents and staff are increasingly impacted by it and are more
aware of the risks and dangers if things go wrong. The more
people are aware, at all levels of the organization, the better we
can do the right things to carefully process and protect our data.
9. Conclusion
This paper has explored the critical role that awareness plays in
promoting privacy-conscious behaviors in the digital age. The in-
creasing reliance on digital platforms has heightened the need for
effective privacy education, yet traditional awareness campaigns
often fall short due to gaps in engagement, lack of relatability,
and limited reach. Through the analysis of research and theoreti-
cal frameworks, it has become clear that creative advocacy
presents a promising approach to overcoming these challenges.
When innovative strategies such as interactive campaigns, gami-
fied learning, digital storytelling, and social media engagement,
Works Cited
Ara, Anjuman, et al. “The Effects of Privacy Awareness, Security Concerns and
Trust on Information Sharing in Social Media among Public University Stu-
dents in Selangor.” International Business Education Journal, vol. 15, no. 2,
15 Dec. 2022, pp. 93–110, doi:10.37134/ibej.vol15.2.8.2022.
Bélanger, France, and Robert E Crossler. “Privacy in the Digital Age: A Review of
Information Privacy Research in Information Systems.” MIS Quarterly, vol.
35, no. 4, 2011, p. 1017, doi:10.2307/41409971.
Crisan, Camelia, and Dumitru Bortun. “Exploring the Potential of Digital Stories as
Tools for Advocacy.” Digital Storytelling, 2017, pp. 155–165, doi:10.1057/978-1-
137-59152-4_13.
Das, Bappa, and Debkumar Chakrabarti. “Image Is a Tangible Element of Visual
Communication: Role of the Image to Increase Social Awareness.” Smart In-
novation, Systems and Technologies, 2021, pp. 783–793, doi:10.1007/978-981-
16-0084-5_64.
Abstract
This paper attempts to investigate the impacts of deepfake tech-
nology, which is propelled by the emergence of artificial intelli-
gence (AI). In the data privacy world, there has been significant
concerns about the safety of information ecosystems, which has
happened because of the enormous presence of fake information,
in both audio and video formats in the information space, which
are known as deepfakes. Deepfakes involve using synthetic media
to make powerful machine learning algorithms, which could be
deployed to produce fake audio/videos to wrongly inform indi-
viduals or general members of the public. The sharp rise in the
growth of deepfake through Artificial Intelligence creates chal-
lenges while consumers of information try to identify genuine in-
formation from fake ones, this puts individuals at risk of exposure
to issues such as identity theft, financial losses, general breach of
personal privacy, and physical harm amongst others, while also
compromising the integrity of data sources. This paper evaluates
the rising implications of Deepfake technology on individual pri-
vacy and security, the level of adequacy of existing laws and
frameworks in regulating such. Findings may support policymak-
ers, information technology experts, and the public on response
to the potential threats, and how to manage possible negative
impacts.
1. Introduction
Technological advancements have increased astronomically in
recent times, a major milestone was the introduction of Artificial
intelligence (AI). The rapid growth of AI has further driven innova-
tion on a global level, its impact affecting many industries and
changing their daily activities. However, with the positive impacts
of AI, there have also been negative implications. One of the dan-
gerous impacts of AI has been the rise of deepfake technology. In
simple terms, a deepfake is a piece of artificial media that uses
false intelligence processes to either construct or edit an image,
video, or audio recording in such a way that it portrays an event
or a person wrongly (Kapoor, 2024). Mahashreshty (2023) also con-
ceives deepfake as an artificial intelligence technology, which can
create hyper-realistic media such as images and video. This made
it possible to create audio or video of a real person saying and
doing things he or she never said or did.
Information technology has improved very much in the last dec-
ade. Unfortunately, misapplications of technology have accompa-
nied developments in the IT world. Deepfake can be highly deceiv-
ing and dangerous as it has a high potential to manipulate the
public’s opinions and their decision making. It is also causing
problems in the lives of individuals, who have been victims of at-
tempts to tarnish their brands. Oftentimes, deepfakes are usually
targeted at political leaders, celebrities, and artists, however it
could be used to cause damage to individuals. Deepfake technol-
ogy can be used in creating bad videos/audios of a person as a
form of bullying, revenge, and blackmailing tool. As technological
advancement is inevitable, threats associated with its develop-
6. Recommendations
● Regulatory Framework Development: Comprehensive frame-
works addressing deepfake technology should be established
through collaboration between governments and regulatory au-
thorities. Guidelines for the production, dissemination, and identi-
fication of deepfakes, as well as the repercussions for their abuse,
should be laid forth in these frameworks.
● Investment in Detection and Verification Tools: Advanced
deepfake detection and verification techniques should be the fo-
cus of financial resources. Among these measures is the backing
of AI-powered systems that can detect deepfakes in photos, vid-
eos, and audio formats.
● Public Awareness and Education Campaigns: The presence and
potential consequences of deepfake technology should be
brought to the attention of the public through awareness cam-
paigns. The significance of thinking critically and checking infor-
mation while consuming media should be emphasized in these
efforts.
● Media Literacy Programs in Education: Educators should in-
clude media literacy courses in their lesson plans so that students
may learn to recognize fake news and other forms of manipula-
tion. Programs like this should make digital citizenship, source
assessment, and critical thinking a priority.
● Collaboration with Tech Companies: Collaboration among gov-
ernments, academics, and technology businesses is critical in
fighting deepfake technology. The tech industry should push for
the creation and implementation of strong systems to identify and
report deepfakes on their platforms.
Works Cited
Albahar, Mohammed, and Jameela Almalki. "Deepfakes: Threats and Countermea-
sures Systematic Review."Journal of Theoretical and Applied Information
Technology, vol. 97, no. 22, 2019, pp. 3242–3250.
Bates, Kristyn, et al. "How Deepfakes and Artificial Intelligence Could Reshape
the Advertising Industry: The Coming Reality of AI Fakes and Their Potential
Impact on Consumer Behavior."Journal of Advertising Research, vol. 62, no. 3,
2022, pp. 241–251.
Caporusso, Nicola. "Deepfakes for the Good: A Beneficial Application of Conten-
tious Artificial Intelligence Technology."Advances in Artificial Intelligence,
Software and Systems Engineering: Proceedings of the AHFE 2020 Virtual
Conferences on Software and Systems Engineering, and Artificial Intelligence
and Social Computing, July 16-20, 2020, USA, edited by Tareq Ahram and
Redha Taiar, Springer International Publishing, 2020, pp. 235–241.
Chesney, Robert, and Danielle Citron. "Deep Fakes: A Looming Challenge for Pri-
vacy, Democracy, and National Security."California Law Review, vol. 107, 2019,
pp. 1779–1783.
Hancock, Jeffrey T., and Jeremy N. Bailenson. "The Social Impact of Deep-
fakes."Cyberpsychology, Behavior and Social Networking, vol. 24, no. 3, 2021,
pp. 149–152.
International Covenant on Civil and Political Rights. Office of the High Commis-
sioner for Human Rights,www.ohchr.org/en/instruments-
Abstract
Organizations are confronted with the critical task of balancing
data minimization against key business objectives. Central to
global privacy regulations, including the Nigeria's Data Protection
(NDPAct), the principle of data minimization demands that only
personal data essential for specified, explicit and legitimate pur-
poses be collected. Yet, this principle often conflicts with business
practices that rely on comprehensive data for analytics, innova-
tion, and enhanced customer engagement. This article delves into
the delicate balance between data minimization and business
needs, particularly within the context of the NDP Act. It analyzes
relevant regulatory frameworks, addresses the challenges faced
by businesses, and explores effective strategies such as Privacy by
Design (PbD) and Privacy-Enhancing Technologies (PETs) to har-
monize compliance with business expansion. Using secondary da-
ta demonstrates that ethical data handling can substantially low-
er regulatory risks, build consumer trust, and enhance overall op-
erational efficiency. By integrating innovative strategies and pri-
oritizing privacy in their organizational processes, businesses can
1. Introduction
As organizations increasingly rely on data to drive customer in-
sights, enhance operational efficiency, and maintain competitive
advantage, they face the complex challenge of balancing data mi-
nimization with business needs. Data minimization, is a funda-
mental principle embedded in key data protection regulations,
including the General Data Protection Regulation (GDPR) in the
European Union and Nigeria's Data Protection Act (NDP Act), and it
is a core tenet of privacy legislation globally. It requires organiza-
tions to limit data collection to what is strictly necessary for spe-
cific, legitimate purposes (GDPR, Art. 5(1)(c); NDP Act, 2023, S24).
This principle supports individual privacy and mitigates risks as-
sociated with data breaches and unauthorized access. While data
minimization safeguards privacy rights, it often conflicts with
business objectives, where broader data access can enhance deci-
sion-making, customer experiences, and product development.
Achieving an effective balance between regulatory compliance
and operational needs requires a strategic approach that upholds
privacy standards without hindering innovation and business
growth.
The NDP Act emphasizes the importance of data minimization by
mandating that data controllers and processors collect only the
personal data necessary for intended purposes. This legal frame-
2. Literature Review
Data minimisation is a principle grounded in social science theo-
ries that emphasise humanautonomy, privacy, and social fairness.
Below are few fundamental social science theories that support
data minimisation:
Theories of Privacy - The Right to Privacy by Warren and Brandeis
(1890) asserts that individuals possess the right to solitude and to
regulate their personal information. Data minimisation adheres to
this idea by restricting the acquisition and keeping of personal
information.
Westin's Privacy Framework: Westin's (1967) approach delineates
five privacy rights: personal privacy, residential privacy, commu-
nicative privacy, informational privacy, and privacy of choice. Data
minimisation upholds these rights by restricting the acquisition
and utilisation of personal data.
Theory of Social Contract - Implicit Agreement: Social contract
theory posits that individuals tacitly consent to specific laws and
norms in return for the advantages of societal existence (Hobbes
1985). Data minimisation represents a societal consensus to re-
strict the collection and utilisation of personal information in re-
turn for the advantages of technology progress.
Ethical Theories - Deontological Ethics: This ethical framework
prioritises responsibility and obligation. Data minimisation is re-
garded as an ethical obligation to safeguard personal privacy and
3. Analysis
To understand the intersection between data minimization prin-
ciples and business needs, it is essential to analyze existing prac-
tices and their implications. This section examines current trends
in data collection, ethical challenges, and consumer attitudes,
drawing on real-world case studies.
5. Conclusion
The findings affirm that companies often collect more data than
they need. This practice is largely fueled by the assumption that
having more data offers a competitive advantage, combined with
the low cost of storage and the ease of collection enabled by ad-
vanced tracking technologies. However, much of this data classi-
fied as "dark data" remains unused, highlighting a lack of clear
objectives in data collection strategies. Companies do not need to
gather such excessive amounts of data. Over-collection leads to
significant ethical, regulatory, and operational challenges, includ-
ing compromised consumer trust, inefficiencies, and heightened
cybersecurity risks. Businesses benefit more from collecting and
managing purpose-driven, actionable data that aligns with specif-
ic goals. By adopting data minimization principles and leveraging
privacy-enhancing technologies, organizations can collect only
what is necessary, ensuring compliance, fostering consumer trust,
ABSTRACT
Cross-border data transfer is essential to the proper functioning
of an international economy. Daily, people continue to make
transactions and subscribe to digital platforms to access the digi-
tal tools provided by these platforms. In the process of carrying
out these transactions, personal data is required and supplied.
These personal data could be transferred across jurisdictions and
susceptible to breach where adequate protections are not pro-
vided. This article explores the compliance challenges in manag-
ing cross-border data transfers. It also provides actionable prac-
tices for preventing data breaches, helping organizations estab-
lish a robust data protection framework that not only meets legal
requirements but also protects data subjects and fosters their
trust in the organization or company. In this age, data privacy and
protection are paramount, and it is important for businesses to be
proactive in their approach to cross-border data security to safe-
guard both their reputation and the data of their customers.
2. Types of Data
Data can be transmitted through means such as email, file trans-
fer, and cloud storage services, among many others. Various types
of data exist, including personal data, financial data, and sensitive
data.
According to the General Data Protection Regulation, otherwise
known as GDPR, Personal data is “any information relating to an
identified or identifiable natural person (‘data subject’); an identi-
fiable natural person is one who can be identified, directly or indi-
rectly, in particular by reference to an identifier such as a name,
an identification number, location data, an online identifier or to
one or more factors specific to the physical, physiological, genetic,
mental, economic, cultural or social identity of that natural per-
son”; (Article 4, General Data Protection Regulation).
Under personal data, there exist the following types of data, and it
encapsulates these other types of data as they relate to a natural
person.
i. Data concerning health, which is data related to a natural
person’s health, whether physical or mental and also en-
capsulates the provision of health information about such
an individual.
ii. Biometric data, which confirms a person's physical and psy-
chological features, helps to create a distinctive and
unique identification of that person.
iii. Sensitive personal data is data that the controller must not
use or permit the processor to use unless with the express
consent of the data subject or in some other circums-
tances. If the data subject withdraws consent, the control-
7. Conclusion
Personal data is a crucial asset that requires stringent safeguards
to prevent breaches, especially during cross-border data transfers
where risks are heightened. This article has explored the chal-
lenges influencing compliance with regulatory requirements in
cross-border data transfer such as conflicting laws in different
jurisdictions, security risks, obtaining requisite consents and per-
mits, and regulatory complexities amongst others. In this regard,
this article further proposed key practices that may be engaged in
by organizations to navigate these compliance challenges such as
adopting international data transfer mechanisms, using end-to-
end encryption of data to prevent breaches, conducting regular
data protection impact assessments, monitoring and auditing
third-party vendors where they are involved in the data transfer,
and also staying updated with evolving regulatory requirements
amongst others. These best practices can be adopted by data con-
trollers and processors ensure that regardless of the jurisdictional
complexities, maximum protection is afforded to personal data
and by doing this, compliance will be fostered in our increasingly
digitalized global world and data breaches will be minimized.
ABSTRACT
The article examines the crucial role of Data Protection Authori-
ties (DPAs) in Nigeria (NDPC) and Brazil (ANPD) in enforcing com-
prehensive privacy laws inspired by the GDPR framework and pro-
tecting the rights of data subjects. In both countries, DPAs have
been established as independent entities with responsibility for
overseeing compliance with data protection laws. They have pow-
ers to investigate possible violations, impose sanctions and pro-
mote public awareness of the importance of data protection. Al-
though they share very much similar responsibilities, there are
some notable differences in their regulatory structures. The article
highlights the challenges faced by the Nigerian and Brazilian DPAs
and underscores the importance of international cooperation,
which both recognize as crucial, particularly in the context of
evolving data protection legal frameworks, increasing cross-
border data flows, and emerging complex challenges such as the
proliferation of AI systems. In conclusion, while the DPAs of Nige-
ria and Brazil each face unique challenges, their collaboration
holds significant potential to align enforcement actions, facilitate
the sharing of best practices, foster mutual learning, and enhance
regulatory responses in the rapidly evolving, data-driven global
economy.
1. Introduction
In a globalized world where information and personal data are
accessed simultaneously across borders, privacy and data protec-
tion have become a universal concern for people everywhere. Pri-
vacy is no longer a topic confined to discussions within restricted
groups, but has become a subject of everyday conversations in
society. People are increasingly concerned about their privacy and
how their personal data is being collected and used by companies
and governments. Not only have privacy laws proliferated world-
wide, but they have also shown similarities in the essential ele-
ments of their structures.
As Danilo Doneda points out, data protection laws are showing a
clear tendency to converge, as the nature of the subject matter
discourages the adoption of isolated national legal solutions. The
cross-border transfer of personal data, driven by global business
operations and digital technologies, requires harmonized rules to
ensure effective protection of individuals across different jurisdic-
tions.
Similarly, the Centre for Information Policy Leadership (CIPL) em-
phasizes the need for global convergence and interoperability be-
tween privacy laws. Consequently, countries are aligning local
regulations with global standards to foster legal certainty for
business and ensure adequate protection for individuals in the
search for balancing innovation and fundamental rights.
As outlined by the Organisation for Economic Co-Operation and
Development (OECD), although national laws and policies may dif-
fer, there is a shared interest among countries in protecting priva-
Works Cited
Autoridade Nacional de Proteção de Dados. "Autoridade Nacional de Proteção de
Dados e Secretaria Nacional do Consumidor Lançam 'Como Proteger Seus
Dados Pessoais'." Autoridade Nacional de Proteção de Dados, 2023,
https://www.gov.br/anpd/pt-br/assuntos/noticias/autoridade-nacional-
de-protecao-de-dados-e-secretaria-nacional-do-consumidor-lancam-
201ccomo-proteger-seus-dados-pessoais201d.
Autoridade Nacional de Proteção de Dados. "ANPD Publica Guia de Segurança
para Agentes de Tratamento de Pequeno Porte." Autoridade Nacional de
Proteção de Dados, 2023, https://www.gov.br/anpd/pt-
br/assuntos/noticias/anpd-publica-guia-de-seguranca-para-agentes-de-
tratamento-de-pequeno-port.
Autoridade Nacional de Proteção de Dados. "Regulamentações da ANPD." Autori-
dade Nacional de Proteção de Dados, 2023, https://www.gov.br/anpd/pt-
br/acesso-a-informacao/institucional/atos-