{"id":12312,"date":"2023-03-20T10:00:30","date_gmt":"2023-03-20T14:00:30","guid":{"rendered":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?p=12312"},"modified":"2023-03-20T02:14:46","modified_gmt":"2023-03-20T06:14:46","slug":"focus-on-data-privacy-africa","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/","title":{"rendered":"FOCUS on Data Privacy: Africa"},"content":{"rendered":"<p><strong>Megan Gawron<\/strong><br \/>\n<em><strong>Editor-in-Chief<\/strong><\/em><\/p>\n<p><span style=\"font-weight: 400\">Telecommunications channels are rapidly developing across Africa, providing new opportunities for interconnectedness. <\/span><a href=\"https:\/\/foreignpolicy.com\/2023\/03\/10\/africa-china-russia-subsea-cables\/\"><span style=\"font-weight: 400\">Foreign Policy<\/span><\/a><span style=\"font-weight: 400\"> explains that China has been a driving force behind this development for years, providing vital assets for expanding broadband access, semiconductor use, and artificial intelligence (AI) development. While this expansion is a critical part of economic and cultural development, it poses a clear risk to data privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Between 2012 and 2019, 10 African nations\u2014from Ghana to Madagascar\u2014have passed laws to protect data privacy. For example, Kenya passed the Data Protection Act in 2019, which created the Office of the Data Protection Commissioner to regulate how personal information is processed, according to <\/span><a href=\"https:\/\/www.bakermckenzie.com\/en\/newsroom\/2022\/04\/data-security-and-privacy-laws-across-africa\"><span style=\"font-weight: 400\">Baker McKenzie<\/span><\/a><span style=\"font-weight: 400\">. These countries have made significant progress toward more comprehensive privacy laws, which was spurred by accelerative digitization during the pandemic. As of 2023, 30 countries in Africa have enacted laws like this. However, this is still a relatively untouched subject in Africa\u2019s other 24 nations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In Nigeria, privacy advocates became particularly concerned when biometric data was collected and used at 98 percent of polls during the country\u2019s elections in February. <\/span><a href=\"https:\/\/www.biometricupdate.com\/202302\/biometrics-used-at-98-of-nigerian-polls-advocates-concerned-for-safety-of-voters-data\"><span style=\"font-weight: 400\">Biometric Update reports<\/span><\/a><span style=\"font-weight: 400\"> that Nigeria uses a Biometric Voter Accreditation System (BVAS) during election cycles. The BVAS is meant to ensure election integrity, but requires citizens to provide their fingerprints and use facial recognition systems in order to cast their votes. <\/span><a href=\"https:\/\/www.reuters.com\/article\/nigeria-election-id-idAFL8N35360C\"><span style=\"font-weight: 400\">Reuters<\/span><\/a><span style=\"font-weight: 400\"> continues that this poses a clear threat to data privacy by acting as a tool of mass surveillance. With little cybersecurity protection and few options for recourse, privacy advocates worry that the 93 million Nigerians who voted in last month\u2019s election are at risk of identity theft and data monitoring. Nigeria currently does not have a data privacy bill.<\/span><\/p>\n<p><a href=\"https:\/\/carnegieendowment.org\/2023\/03\/13\/cyber-resilience-must-focus-on-marginalized-individuals-not-just-institutions-pub-89254\"><span style=\"font-weight: 400\">The Carnegie Endowment for International Peace<\/span><\/a><span style=\"font-weight: 400\"> warns that, without adequate data privacy regulations, marginalized groups will face high risks to their livelihoods. In Nigeria, over 40 million people live in rural areas with little to no access to banks. The expansion of mobile banking has been revolutionary for these underserved regions by enabling banking where traditional infrastructure does not exist. However, lack of data privacy and security regulations have enabled rampant fraud. Participation in a digital economy always carries risks, but these risks are exacerbated when adequate protection members are either not in place or not enforced by the government.<\/span><\/p>\n<p><a href=\"https:\/\/breakingdefense.com\/2023\/02\/how-ai-became-the-autocrats-new-toolkit-book-excerpt\/\"><span style=\"font-weight: 400\">Breaking Defense<\/span><\/a><span style=\"font-weight: 400\"> explains that there is another risk associated with inadequate privacy regulation: digital authoritarianism. In Zimbabwe, the government formed a partnership with CloudWalk, a Chinese company, to develop AI that would create a national database for facial recognition. While the government characterized this as an attempt to revolutionize how the country approaches digitalization, privacy advocates have referred to this work as \u201cthe autocrat\u2019s new toolkit.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">In February, Ghana celebrated Data Privacy Week, with the Data Protection Commission announcing that it would crack down on nearly 300 institutions that are failing to protect data, <\/span><a href=\"http:\/\/www.businessghana.com\/site\/news\/general\/279156\/The-DPC-climaxes-Data-Privacy-Week\"><span style=\"font-weight: 400\">Business Ghana<\/span><\/a><span style=\"font-weight: 400\"> reports.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For countries like Ghana, which has created several initiatives to protect citizens\u2019 privacy, increased digitalization provides significant growth opportunities. <\/span><a href=\"https:\/\/www.techtarget.com\/searchcio\/news\/252502418\/Federal-data-privacy-legislation-could-benefit-US-economy\"><span style=\"font-weight: 400\">Tech Target<\/span><\/a><span style=\"font-weight: 400\"> explains that while people traditionally view privacy regulations as solely pertaining to personal and national security, there is also a significant economic opportunity to be had. Focus on data privacy has recently ramped up in both Europe and North America, in part as a response to fears of Chinese data monitoring. Tech Target continues that requiring domestic businesses to increase their privacy standards will enable these companies to be more competitive in the international market, as new privacy standards must be met in order to conduct trade. As a result, increasing privacy requirements is becoming a large part of expanding business in a rapidly modernizing world.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Data privacy is rapidly expanding in Africa, a trend that is likely to continue. The recent emphasis on regulation presents opportunities for expansion and protection. However, for the countries that are lagging behind, the risks they face only continue to increase while digitalization creates new dangers for the unprotected and underprepared.<\/span><\/p>\n<p>Image courtesy of the <em><a href=\"https:\/\/www.issa.org\/event\/privacy-sig-emerging-trends-in-data-protection-in-africa\/\">Information Systems Security Association International<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Carnegie Endowment for International Peace warns that, without adequate data privacy regulations, marginalized groups will face high risks to their livelihoods,<\/p>\n","protected":false},"author":5096,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2496,2521,5],"tags":[571,2522,2523,2524],"class_list":["post-12312","post","type-post","status-publish","format-standard","hentry","category-march-2023","category-data-privacy","category-focus","tag-data-privacy","tag-accelerative-digitization","tag-security-regulation","tag-privacy-standards"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FOCUS on Data Privacy: Africa - The Diplomatic Envoy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FOCUS on Data Privacy: Africa - The Diplomatic Envoy\" \/>\n<meta property=\"og:description\" content=\"The Carnegie Endowment for International Peace warns that, without adequate data privacy regulations, marginalized groups will face high risks to their livelihoods,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/\" \/>\n<meta property=\"og:site_name\" content=\"The Diplomatic Envoy\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T14:00:30+00:00\" \/>\n<meta name=\"author\" content=\"Megan Gawron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megan Gawron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/\"},\"author\":{\"name\":\"Megan Gawron\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/608133b049b265218ca3b818cb69bf59\"},\"headline\":\"FOCUS on Data Privacy: Africa\",\"datePublished\":\"2023-03-20T14:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/\"},\"wordCount\":665,\"commentCount\":0,\"keywords\":[\"Data Privacy\",\"Accelerative digitization\",\"security regulation\",\"privacy standards\"],\"articleSection\":[\"March 2023\",\"Data Privacy\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/\",\"name\":\"FOCUS on Data Privacy: Africa - The Diplomatic Envoy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\"},\"datePublished\":\"2023-03-20T14:00:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/608133b049b265218ca3b818cb69bf59\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/03\\\/20\\\/focus-on-data-privacy-africa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FOCUS on Data Privacy: Africa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\",\"name\":\"The Diplomatic Envoy\",\"description\":\"Words Beyond Borders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/608133b049b265218ca3b818cb69bf59\",\"name\":\"Megan Gawron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aded1e65b8d480d977b773451d5bab9b89d598b381d10967646086e24d58a47c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aded1e65b8d480d977b773451d5bab9b89d598b381d10967646086e24d58a47c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aded1e65b8d480d977b773451d5bab9b89d598b381d10967646086e24d58a47c?s=96&d=mm&r=g\",\"caption\":\"Megan Gawron\"},\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/author\\\/gawronme\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FOCUS on Data Privacy: Africa - The Diplomatic Envoy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/","og_locale":"en_US","og_type":"article","og_title":"FOCUS on Data Privacy: Africa - The Diplomatic Envoy","og_description":"The Carnegie Endowment for International Peace warns that, without adequate data privacy regulations, marginalized groups will face high risks to their livelihoods,","og_url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/","og_site_name":"The Diplomatic Envoy","article_published_time":"2023-03-20T14:00:30+00:00","author":"Megan Gawron","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Megan Gawron","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/#article","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/"},"author":{"name":"Megan Gawron","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/608133b049b265218ca3b818cb69bf59"},"headline":"FOCUS on Data Privacy: Africa","datePublished":"2023-03-20T14:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/"},"wordCount":665,"commentCount":0,"keywords":["Data Privacy","Accelerative digitization","security regulation","privacy standards"],"articleSection":["March 2023","Data Privacy","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/","name":"FOCUS on Data Privacy: Africa - The Diplomatic Envoy","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website"},"datePublished":"2023-03-20T14:00:30+00:00","author":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/608133b049b265218ca3b818cb69bf59"},"breadcrumb":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/03\/20\/focus-on-data-privacy-africa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/"},{"@type":"ListItem","position":2,"name":"FOCUS on Data Privacy: Africa"}]},{"@type":"WebSite","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/","name":"The Diplomatic Envoy","description":"Words Beyond Borders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/608133b049b265218ca3b818cb69bf59","name":"Megan Gawron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/aded1e65b8d480d977b773451d5bab9b89d598b381d10967646086e24d58a47c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/aded1e65b8d480d977b773451d5bab9b89d598b381d10967646086e24d58a47c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aded1e65b8d480d977b773451d5bab9b89d598b381d10967646086e24d58a47c?s=96&d=mm&r=g","caption":"Megan Gawron"},"url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/author\/gawronme\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/12312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/users\/5096"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/comments?post=12312"}],"version-history":[{"count":3,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/12312\/revisions"}],"predecessor-version":[{"id":12315,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/12312\/revisions\/12315"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/media?parent=12312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/categories?post=12312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/tags?post=12312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}