10 Key Words in the Data Protection Act
The Kenya Data Protection Act (“DPA“)applies to all persons who handle personal data. For effective compliance, it is necessary to understand the Act’s key terms. Outlined below, is my take on some of the key terms that may be relevant in your compliance journey.
Data Protection Key Terms
1. Data Subject
The DPA defines a data subject as any identified or identifiable natural person who is the subject of personal data. In other words, a data subject is any human being whose data is being collected, held or processed.
2. Personal Data
Any information relating to an identified or identifiable natural person i.e. a human being. The illustration below shows some common forms of personal data.
3. Sensitive Personal Data
In addition to the forms of personal data described above, the DPA establishes a special category of data known as Sensitive Personal Data. In essence, this is any information that reveals a human being’s, race, health status, social origin, property details, marital status, conscience, belief, genetic data, biometric data, family details including the name of the person’s spouse, children, sex or sexual orientation.
4. Data Controller
A data controller is an individual, body corporate, public authority, agency or any other similar body which, alone or jointly with others, determines the purpose and ways of processing personal data.
In summary, a data controller is any person or organization that determines the purpose and means by which data is processed.
5. Data Processor
This is an individual, body corporate, public authority, agency or similar body that processes data on behalf of the Data Controller.
The DPA defines consent as “any manifestation of express, unequivocal, free, specific and informed indication of the data subject’s wishes by a statement or by clear affirmative action, signifying agreement to the processing of personal data relating to the data subject.” Data Subject consent should be:-
- express – it should not be implied nor should it be done on the basis of automated processing.
- unequivocal and free – it should be given without duress or coercion.
- specific – the purpose of the consent should be clearly defined and explained to the data subject.
- informed – it should be given pursuant to the purposes set out by the data collector or processor.
7. Data Retention
This refers to the period of time that data can be held by a controller or a processor. The DPA provides that data controllers and processors may only retain data for as long as may be reasonably necessary but it does not prescribe specific timeframes for retention of data. Instead, data processors and controllers should develop organisational measures that adequately address data retention. In practice, development and implementation data retention policies and processes may suffice.
8. Data Commissioner
This is the regulatory body responsible for regulating/enforcing compliance with provisions of the DPA. As I write this, the appointment and establishment of the Data Commissioner’s office has not been effected. However, there are indications that the appointment may be done within the second half of 2020.
9. Data Protection Officer (DPO)
The primary obligation of DPO’s appointed pursuant to the Act is to provide oversight on compliance. In particular, DPO’s advise the business on the requirements of the Act but to also oversee compliance and facilitate capacity building of staff involved in Data Protection activities. Finally, the DPO is the liaison between the Data Controller and Data Processor on all matters relating to Data Protection
10. Personal Data Breach
Under the DPA, a “personal data breach” means a breach of security leading to the accidental and unlawful destruction, loss alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed. Personal data breaches can occur in many ways. Firstly, a personal data breach may happen accidentally e.g. an email sent to the wrong recipients. It can also arise through deliberate actions or omissions of data controllers or data processors. Other examples include breaches arising from the theft of computer devices and the alteration of personal data.
Data controllers should report data breaches to the Data Commissioner within 72 hours of occurrence. In addition, inform the concerned data subject of the breach within a reasonably practical period. Data processors must report breaches within 48 hours of occurrence. Section 43 of the DPA sets out the procedure for reporting personal data breaches.
***Disclaimer! Venturelawkenya contains only general information about legal matters. It is not legal advice and should not be treated as such. You must not rely on the information on this website as an alternative to legal advice from your lawyer/advocate or other professional legal services provider. If you have specific questions about any legal matter you should consult with your advocate or any other suitable professional legal service provider.
Disclaimer: The information on this blog is available for informational purposes only and is not considered legal advice on any subject matter. By viewing blog posts, the reader understands there is no advocate-client relationship between the reader and the blog publisher. The blog should not be used as a substitute for legal advice from a licensed professional advocate, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation. The information on the blog may be changed without notice and is not guaranteed to be complete, correct or up-to-date. While the blog is revised on a regular basis, it may not reflect the most current legal developments.