Copy of Privacy and Data Protection_compressed
Copy of Privacy and Data Protection_compressed
businesses, governments).
• Need to balance privacy, security, and innovation.
• Right to Access
• Right to Rectification
• Right to Erasure (“Right to be Forgotten”)
• Right to Object
• Data flows across borders, but laws are
national.
• Examples of Global Issues:
• GDPR applies worldwide but is hard to
enforce.
• U.S. and China have weaker privacy laws.
• Tech giants store data in multiple
countries (jurisdictional conflicts).
• Possible Solutions:
• Stronger international agreements.
• Increased cooperation among Data
Protection Authorities.
1. Conflicts Between Privacy & Security
• National Security
• Law Enforcement
• Public Health
RESPONSIBILITIES OF ORGANIZATIONS
the responsibility to protect personal
data effectively and to exercise
intellectual property rights properly.
01 Personal data should only be collected
for specific purposes and it should not
then be processed for another purpose
or use
•
•
•
•
•
•Jamaica’s BPO & GDPR: •CARICOM IMPACS &
01 Firms handling EU data 02 Regional Security: Data
(e.g., Sutherland Global sharing for crime-
Services) comply with fighting.
GDPR.
2. CHINA
• Lax privacy laws enable AI surveillance (e.g., gait recognition)
• What is Gait Recognition? artificial intelligence is used to identify
persons from over 160 feet away even if their face is covered or their
back is turned to the camera. It assists the police in identifying
fugitives and even jawalkers.
• Prioritization of security over individual privacy
Key Caribbean privacy laws:
• Barbados Data Protection Act (2019)
• Jamaica Data Protection Act (2020)
• Trinidad & Tobago Data Protection Act (2011)
Challenges:
• Weak enforcement and lack of awareness.
• Limited regulatory oversight.
Recommendations:
• Strengthen data protection authorities.
• Harmonize CARICOM-wide regulations.
• Customer transaction details were leaked online.
• Impact:
• Eroded customer trust.
• Highlighted weak security practices.
• Lessons learned:
• Need for stronger cybersecurity in financial institutions.
• Importance of compliance with Jamaica’s Data Protection Act.
1. REAL-TIME MONITORING & 2. BAHAMAS POLICE 3. STRENGTHENING CYBERSECURITY
FRAUD PREVENTION DATABASE HACK (2021) IN THE CARIBBEAN
Why is real-time monitoring
important? • Hackers accessed and Key cybersecurity weaknesses:
• Detects suspicious activity early. leaked police reports. • Outdated IT infrastructure.
• Prevents fraudulent transactions • Impact: • Low awareness
and data breaches. • Exposed witness • Weak government
regulations.
information and crime scene
Common threats: Solutions:
details.
• Phishing – Fake emails stealing • Enforce Multi-Factor
Lessons learned:
credentials. Authentication
• Need for encryption and
• Ransomware . • Develop National
access controls. Cybersecurity Centers.
• Insider Threats.
• Governments must prioritize • Secure Data Encryption
• Card Fraud
real-time monitoring. • Invest in Cyber Incident
Best Practices: Response Teams (CIRTs).
• AI-powered threat detection.
• Automated fraud alerts.
• Continuous network monitoring.
• Ransomware attack disrupted
government services.
Impact:
• Delayed operations and increased
costs.
Lessons learned:
• Need for better data backups and
response plans.
• Stronger cybersecurity measures
needed in government agencies.
• Amazon was fined for violating data
privacy rules in targeted advertising.