International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT.

Slides:



Advertisements
Similar presentations
JCAHO –A HIPAA Business Associate National HIPAA Summit
Advertisements

1 SOURCES AND SCOPE OF COMMUNITY LAW Michele Colucci Web site: PARMA 8-9 November.
Re-use of PSI Data Protection Issues Cécile de Terwangne Professor at the Law Faculty, Research Director at CRIDS University of Namur (Belgium) 2 nd LAPSI.
PRIVACY ASPECTS OF RE-USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR
ITU – EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2nd Workshop on Lesotho National Transposition of SADC Cybersecurity.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2 nd Workshop on Tanzania National.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT.
1 Enforcement Powers of National Data Protection Authorities and Experience gained of the Data Protection Directive Safe Harbour Conference Washington.
DRAFTING A BILL OF LAW Resource: Maritza Torres-Rivera Francisco J. Domenech, Esq. Director.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Meeting with Data Protection Law Stakeholders 02 April 2013 PRESENTATION.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
HIPSSAPROJECT Support for Harmonization of the ICT Policies in Sub-Sahara Africa Meeting with Data Protection Law Stakeholders 28/29 th August, 2013 PRESENTATION.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
DATA PROTECTION BILL PRESENTED BY GERTRUDE M. IMBWAE National Legal Expert On Data Protection.
HIPSSA Support for Harmonization of the ICT Policies in Sub-Sahara Africa 28/29 August, 2013, Swaziland.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry.
The Data Protection (Jersey) Law 2005.
Data Protection and the GRA. 1. Commentary on Data Protection 2. The GRA’s Role The Register Investigations, Mediation and Compensation Enforcement Notices.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
Preamble Goals GOALMEANING "In order to form a more perfect union” Create a nation in which states work together. "Establish justice" Setting up a court.
Data Protection: The Law. EU & Irish Legislation Data Protection Directive 95/46/EC Electronic Privacy Directive 2002/58/EC EUROPOL etc Data Protection.
Data Protection Overview
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Drafting Instructions Presentation to the Ministry of Natural Resources, Government of the Turks and Caicos Islands By Professor Tom Johnson York University.
Privacy & Personal Information Prepared by the CBC Law Department CONFIDENTIAL – FALL 2011.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
The Protection of Personal Information Bill 13 February
Lecturer: Lina Vladimirovna Zhornyak, associated professor.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Monique Jefferson & Nadine Mather
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Johannesburg, South Africa
HIPSSA Project TRAINING /DATA PROTECTION LAW Pria Chetty,
Dispute Resolution Between ICT Service Providers in Saudi Arabia
Data Protection: The Law
Privacy principles Individual written policies
Issues of personal data protection in scientific research
Support for Harmonization of the ICT Policies in Sub-Sahara Africa,
MDTFJSS RESULTS IN 2016 Ministry of Justice.
Privacy principles Individual written policies
General Data Protection Regulation
Data Protection & Freedom of Information- An Introduction
FIPPA and CASL Overview
State of the privacy union
G.D.P.R General Data Protection Regulations
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
GDPR Workshop MEU Symposium Prague 2018
The activity of Art. 29. Working Party György Halmos
Information Handling Research Student Induction Day
14. “(1) Unless otherwise agreed where the originator has stated that the electronic communication is conditional on receipt of acknowledgment, the electronic.
PERSONAL INFORMATION BILL
The EDPS: competences and processing of personal data in EU funds
Overview of the recommendations regarding approximation of the Law on personal data protection to the new EU General data protection regulation Valerija.
The Freedom of Information and Data Protection Legislation An Overview
Portfolio Committee Meeting on Higher Education and Training
Presentation transcript:

International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT Ministry PRESENTATION ON DATA PROTECTION BILL Pria Chetty, International Legal Expert on Data Protection

Overview of Session  Why enact Data Protection Law?  Data Protection Model Law Development Process  Key Provisions for Data Protection Law  Key Frames of Inquiry for Transposition of the Model Law  Key Provisions of the Data Protection Bill  Part I, II, III, IV, V, VI, VIII  Discussion

Why Enact Data Protection Law?  Harmonised approaches  Give effect to right to privacy  ICT technology developments impacts right to the protection of personal data in commercial activities and electronic government (eGov) activities  Illegitimate and unlawful use of individual’s information  Automated decision making  Direct marketing practices  Data protection regulation - ensure that the benefits of using information and communication technologies is not met with weakened protection of personal data

Model Law Development Scan of international and regional approaches to data protection Questionnaires to Member States Desktop Research Review Review of International and Regional Policies, Laws, Conventions Comparison of common and differentiated approaches Data Protection Policy and Legal Analysis Draft Model Law Deliberated at workshop with country representatives Incorporation of recommendations and requests for amendment Model Law adoption Data Protection Model Law

Provisions of SADC Model Law  Give effect to principles of data protection  Place limitations on the processing of personal data  Provide for the rights of the data subject  Describe the responsibilities of the Data Controller  Establishment of the Data Protection Authority  Combat violations of privacy likely to arise from the collection, processing, transmission, storage and use of personal dataactivities

Transposition Frames of Inquiry International and regional frameworks establish the primary themes, intent and functional requirements for data protection regulation. Within Tanzania, enquire: 1.Designated national data protection legislation 2.Prevalence of regulation that has a bearing on the right to privacy and protection of personal information in Tanzania.

TANZANIA DATA PROTECTION BILL

Part One 1Short Title 2Commencement 3Object of the Act 4Interpretation 5Savings

Object of the Act to promote the protection of personal information processed by public and private bodies; to introduce information protection principles so as to establish minimum requirements for the processing of personal information; and to provide for matters connected therewith

Interpretation  Personal Information  Processing  Data Subject  Data Processor  Data Protection Officer  Commissioner

Data Controller “data controller” or “controller” refers to any natural person, legal person or public body which alone or jointly with others determines the purpose and means of processing of personal information. Where the purpose and means of processing are determined by or by virtue of an act, decree or ordinance, the controller is the natural person, legal person or public body has been designated as such by or by virtue of that act, decree or ordinance.

Defining Personal Information information about an identifiable individual that is recorded in any form, including, without restricting the generality of the foregoing:- (a)information relating to the race, national or ethnic origin, religion, age or marital status of the individual; (b)information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved; (c)any identifying number, symbol or other particular assigned to the individual; (d)the address, fingerprints or blood type of the individual; (e)the name of the individual where it appears with other personal information relating to the individual or where the disclosure of the name itself would reveal information about the individual; (f)correspondence sent to a data controller by the individual that is explicitly or implicitly of a private or confidential nature, and replies to such correspondence that would reveal the contents of the original correspondence; and (g)the views or opinions of any other person about the individual.

Processing of Personal Information processing: refers to any operation or set of operations which is performed upon personal information, whether or not by automated means, such as obtaining, recording or holding the data or carrying out any operation or set of operations on data, including –  (a) organization, adaptation or alteration of the data;  (b) retrieval, consultation or use of the data; or  (c) alignment, combination, blocking, erasure or destruction of the data

Savings (1)This Act shall not affect the operation of any law that makes provision with respect to the collection, holding, use, correction or disclosure of personal information and is capable of operating concurrently with this Act. If any other legislation provides for safeguards for the protection of personal information that are more extensive than those set out in the information protection principles, the extensive safeguards prevail. (2)This Act shall not restrict the ways of processing and production of information which are legally sanctioned under this Act, including such processing and procedures set out in Schedule One.

Savings  De-identified information  Government departments – national security, defence, prosecution of offences, journalistic purposes, judicial processes, powers of judiciary  Does apply to partial automated processing  Territorial clarity  Data Controller may appoint a representative

Part II 6Collection of personal information 7Source of personal information 8 Accuracy of personal information to be checked before use 9Limits on use of personal information 10Limits on disclosure of personal information 11 Condition for use or disclosure of personal information 12Storage and security of personal information

Part II (cntd…) 13Retention and disposal of personal information 14 Correction of personal information (public authority) 15Data Controller to ensure compliance 16Sensitive Personal Information 17 Limitations on above section accommodating national laws 18Commission to order exceptions 19Commission to establish conditions of processing sensitive personal information

Part VI 45 Data Protection Officers and Data Processors 46Data Controller Direction 47 Proceedings where disclosure was in good faith 48Regulations 49Code of Conduct

Part VII 50To a recipient in a Member State that has transposed the SADC data protection requirements 51To a Member state that has not transposed the SADC data protection requirements or to a non-Member State

CONCLUSION/ POINTS FOR INCLUSION IN DISCUSSION

Discussion  Schedule of Exemptions for Consultation Process and Regulations  Prescription of Court  Duty of Correction of Personal Information (Public Bodies only)  Promotion of Access to Information Act

Thank You Questions? Pria Chetty ITU International Expert: Data Protection Mobile: