SlideShare una empresa de Scribd logo
1 de 1
Data Protection InGhana
With the growing importance andvalue of data as a vitalandstrategic asset, todays Governments, businesses and organisations are facingthe
real challenge of implement reliable andsecure storage, backupto meet this challenge, there is a needto carefullydesigna nddefine their
business requirements.
As today’s governments, agencies, businesses andindividuals are increasinglyrecognizingthe need for data to be protectedagainst a wide
range of attacks, risks and threats, data protectionhasbecome a high priority objective and concern for businesses andgovernments alike. In
turn these institutions nowface real challenges ofidentifying, storing, managing, transmitting andprotectingtheir data so as to mitigate these
threats andattacks. Data protection is concerned with data security, thus thisinvolves confidentiality, integrity, authenticityandprivacyof
data that has to be processed. The Data protectionact largelyhas to do withprivacy;
The needto protect your personal information
Individualsunder this act have been empowered to findout how data heldabout themis protected. This takesinto consideration mechanisms
put in place to avoidanyunauthorized access, unauthorized processing
Personal data (or personal information) means information or an opinion about an identifiedindividual, or anindividual who is reasonably
identifiable, whether the informationor opinionis true or not, andwhether the informationor opinionis recordedinmaterial form or not.
Sensitive personalinformation includes racial or ethnic origin, politicalopinions, membershipof a political association, religious beliefs or
affiliations, philosophicalbeliefs, membership ofa professional or trade association, membershipof a trade union, sexual orientation or
practices, criminal record that is also personal information ,healthinformationabout anindividual, genetic information about an individual
that is not otherwise healthinformation, biometric informationthat is to be usedfor the purpose of automatedbiometric identification
or verification, or biometric templates.
The Data Protection Act controls how your personal information is used byorganisations, businessesor the government.
Everyone responsiblefor using data has to follow strict rules called‘data protectionprinciples’. Theymust make sure the information is:
Used fairlyandlawfully, Usedfor limitedandspecificallystatedpurposes, Usedina waythat is adequate, relevant andnot excessive, Accurate,
Kept for no longer thanis absolutelynecessary, Handledaccording to people’s data protectionrights, Kept safe and secure
Not transferredoutside without adequate protection.
Data ProtectionAct inGhana
In Ghana the Data ProtectionCommission(DPC) is anindependent statutorybodyestablishedunder the Data ProtectionAct, 2012 (Act 843) to
protect the privacyof the individualand personal data byregulating the processingof personal information. The Commission providesfor the
process to obtain, hold, use or disclose personal informationandfor other relatedissues bordering onthe protectionof personal data. The Act
was assentedto on May2012 andcame intoforce inaccordance withSection 99, Act 843 on 16th October 2012.
How does the act work?
According to data protectioncommission, the Act provides standard principlesthat must be compliedwith byall whoprocess personal
informationacrossthe countryandbeyond. The law appliesto allforms of personal data or information storedonbothelectronic andnon-
electronic platforms.
The Act is premised onthe fundamentalrule that all whoprocess personal data must take intoconsiderationthe right of that individual to the
privacyof his or her communications. Thisrecognitionbya data controller or processer should leadto the applicationof th e following Basic
Principles whiles processingsuch information. These include Accountability, Lawfulness Of Processing, SpecificationOf Purpose, Compatibility
Of Further ProcessingWithPurpose Of Collection, QualityOf Information, Openness, Data SecuritySafeguards and Data Subject Participation.
The Act and Employee privacy
Employees’ personal data should be kept safe, secure andup to date byan employer. Data anemployer cankeepabout anemployee includes:
Name, address, date of birth, gender, educationandqualifications, workexperience, National Insurance number, tax code, details ofany
known disability, andemergencycontact details amongst others.
Employers are not alsoleft out;theyshouldbe able to inform the employee what records are kept andhowthey’re used, the confidentialityof
the records, how these records can help withtheir training and development at work.
Aside enjoying the privacyemployees’ rights are spelt out under the act, this includes; Accessto personalinformation, Right to amendyour
personalinformation, Right to prevent processing ofyour personalinformation, Rights to freedom from automated decision making
Data collectionandretention
The most effective means ofmitigatingthe riskof lost or stolen personal data is not to holdthe data inthe first place. Data retention and
replicationshould always be assessedagainst business needandminimised, either bynot collecting unnecessarydata or bydeleting data as
soon as the needfor it has passed.

Más contenido relacionado

La actualidad más candente

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Eryk Budi Pratama
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsVikas Jain
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Dr. Ahmed Al Zaidy
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Dr. Ahmed Al Zaidy
 

La actualidad más candente (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-CommerceRole of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
 

Similar a Data Protection In Ghana

DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATAUncodemy
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?TobyRobinson13
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfkiruthigajawahar6
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .ClinosolIndia
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxkandalamsailaja17
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014UsmanMAmeer
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Workplace Investigations - Safeguarding Sensitive Information with Care.pdf
Workplace Investigations - Safeguarding Sensitive Information with Care.pdfWorkplace Investigations - Safeguarding Sensitive Information with Care.pdf
Workplace Investigations - Safeguarding Sensitive Information with Care.pdfLisa Bell
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxUsmanMAmeer
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
General Data Protection Regulation or GDPR
General Data Protection Regulation or GDPRGeneral Data Protection Regulation or GDPR
General Data Protection Regulation or GDPRNupur Samaddar
 
CHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxCHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxfarewelldump
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
Data Protection and Privacy Laws
Data Protection and Privacy LawsData Protection and Privacy Laws
Data Protection and Privacy Lawsahlawatassociates
 
UAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfUAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfDaviesParker
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Michel Bitter
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leadersDeeson
 

Similar a Data Protection In Ghana (20)

DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Workplace Investigations - Safeguarding Sensitive Information with Care.pdf
Workplace Investigations - Safeguarding Sensitive Information with Care.pdfWorkplace Investigations - Safeguarding Sensitive Information with Care.pdf
Workplace Investigations - Safeguarding Sensitive Information with Care.pdf
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
General Data Protection Regulation or GDPR
General Data Protection Regulation or GDPRGeneral Data Protection Regulation or GDPR
General Data Protection Regulation or GDPR
 
CHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxCHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptx
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Data Protection and Privacy Laws
Data Protection and Privacy LawsData Protection and Privacy Laws
Data Protection and Privacy Laws
 
UAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfUAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdf
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leaders
 

Data Protection In Ghana

  • 1. Data Protection InGhana With the growing importance andvalue of data as a vitalandstrategic asset, todays Governments, businesses and organisations are facingthe real challenge of implement reliable andsecure storage, backupto meet this challenge, there is a needto carefullydesigna nddefine their business requirements. As today’s governments, agencies, businesses andindividuals are increasinglyrecognizingthe need for data to be protectedagainst a wide range of attacks, risks and threats, data protectionhasbecome a high priority objective and concern for businesses andgovernments alike. In turn these institutions nowface real challenges ofidentifying, storing, managing, transmitting andprotectingtheir data so as to mitigate these threats andattacks. Data protection is concerned with data security, thus thisinvolves confidentiality, integrity, authenticityandprivacyof data that has to be processed. The Data protectionact largelyhas to do withprivacy; The needto protect your personal information Individualsunder this act have been empowered to findout how data heldabout themis protected. This takesinto consideration mechanisms put in place to avoidanyunauthorized access, unauthorized processing Personal data (or personal information) means information or an opinion about an identifiedindividual, or anindividual who is reasonably identifiable, whether the informationor opinionis true or not, andwhether the informationor opinionis recordedinmaterial form or not. Sensitive personalinformation includes racial or ethnic origin, politicalopinions, membershipof a political association, religious beliefs or affiliations, philosophicalbeliefs, membership ofa professional or trade association, membershipof a trade union, sexual orientation or practices, criminal record that is also personal information ,healthinformationabout anindividual, genetic information about an individual that is not otherwise healthinformation, biometric informationthat is to be usedfor the purpose of automatedbiometric identification or verification, or biometric templates. The Data Protection Act controls how your personal information is used byorganisations, businessesor the government. Everyone responsiblefor using data has to follow strict rules called‘data protectionprinciples’. Theymust make sure the information is: Used fairlyandlawfully, Usedfor limitedandspecificallystatedpurposes, Usedina waythat is adequate, relevant andnot excessive, Accurate, Kept for no longer thanis absolutelynecessary, Handledaccording to people’s data protectionrights, Kept safe and secure Not transferredoutside without adequate protection. Data ProtectionAct inGhana In Ghana the Data ProtectionCommission(DPC) is anindependent statutorybodyestablishedunder the Data ProtectionAct, 2012 (Act 843) to protect the privacyof the individualand personal data byregulating the processingof personal information. The Commission providesfor the process to obtain, hold, use or disclose personal informationandfor other relatedissues bordering onthe protectionof personal data. The Act was assentedto on May2012 andcame intoforce inaccordance withSection 99, Act 843 on 16th October 2012. How does the act work? According to data protectioncommission, the Act provides standard principlesthat must be compliedwith byall whoprocess personal informationacrossthe countryandbeyond. The law appliesto allforms of personal data or information storedonbothelectronic andnon- electronic platforms. The Act is premised onthe fundamentalrule that all whoprocess personal data must take intoconsiderationthe right of that individual to the privacyof his or her communications. Thisrecognitionbya data controller or processer should leadto the applicationof th e following Basic Principles whiles processingsuch information. These include Accountability, Lawfulness Of Processing, SpecificationOf Purpose, Compatibility Of Further ProcessingWithPurpose Of Collection, QualityOf Information, Openness, Data SecuritySafeguards and Data Subject Participation. The Act and Employee privacy Employees’ personal data should be kept safe, secure andup to date byan employer. Data anemployer cankeepabout anemployee includes: Name, address, date of birth, gender, educationandqualifications, workexperience, National Insurance number, tax code, details ofany known disability, andemergencycontact details amongst others. Employers are not alsoleft out;theyshouldbe able to inform the employee what records are kept andhowthey’re used, the confidentialityof the records, how these records can help withtheir training and development at work. Aside enjoying the privacyemployees’ rights are spelt out under the act, this includes; Accessto personalinformation, Right to amendyour personalinformation, Right to prevent processing ofyour personalinformation, Rights to freedom from automated decision making Data collectionandretention The most effective means ofmitigatingthe riskof lost or stolen personal data is not to holdthe data inthe first place. Data retention and replicationshould always be assessedagainst business needandminimised, either bynot collecting unnecessarydata or bydeleting data as soon as the needfor it has passed.