Data Protection and Privacy Awareness and Cyber Health

INTRODUCTION:
The right to privacy is a fundamental right enshrined in many constitutions around the world, as well as in international human rights law. The right to privacy is multifaceted, but a fundamental aspect of it, increasingly relevant to people’s lives, is the protection of individuals’ data. As early as 1988, the UN Human Rights Committee, the treaty body charged with monitoring implementation of the International Covenant on Political and Civil Rights (ICCPR), recognized the need for data protection laws to safeguard the fundamental right to privacy recognized by Article 17 of the ICCPR.

 

Protecting privacy in the digital age is essential to effective and good democratic governance. However, despite increasing recognition and awareness of data protection and the right to privacy across the world, there is still a lack of legal and institutional frameworks, processes, and infrastructure to support the protection of data and privacy rights. At the same time, the increasing volume and use of personal data, together with the emergence of technologies enabling new ways of processing and using it, mean that regulating an effective data protection framework is more important than ever. Protecting privacy is essential, and the majority of States have adopted some forms of protection; however, frameworks are often inadequate, and have not kept up with modern uses of data and challenges they pose. Data protection laws need to be updated to face emerging challenges. 

Governments across the world are radically changing policies and infrastructure, in the hope of enabling economic opportunity and attracting international investment, ensuring the security of their societies, and strengthening institutions. Governments are continuously developing new policies that demand more data from individuals: a vast change in the relationship between the individual and the State through the accumulation of data. It is not just about government, industry plays an essential role too: they promote the ideas, support the sales of such systems, and provide the tools and services. They may also control the data. This all results in what we call data-intensive systems. These are systems which process data about people, which generate additional data about people, and which rely on data to make decisions about people.

 

COURSE OVERVIEW:
Every time you use a service, buy a product online, register for email, go to your doctor, pay your taxes, or enter into any contract or service request, you have to hand over some of your personal data. Even without your knowledge, data and information about you is being generated and captured by companies and agencies that you are likely to have never knowingly interacted with. The only way citizens and consumers can have confidence in both government and business is through strong data protection practices, with effective legislation to help minimize state and corporate surveillance and data exploitation. 

This course shall give trainees an insight into why it is important not to share personal and sensitive data with data collectors. The course shall also introduce participants to data protection principles, the rights of the citizen, data processors, data controllers and data protection laws in different countries. Trainees will be taken through the seven principles and guidelines of the EU GDPR as well as the expanded OAS Guidelines. Trainees will learn how to protect their personal and corporate data using software tools and algorithms as well as modern encryption techniques. Trainees will be taken through impacts of social media on personal data and how to reduce the threats from online activities.


TARGET AUDIENCES:
This course is targeting staff from Government, Private sector,

Data protection Authorities,
Regulatory Authorities, State law offices, Civil Society and human rights organizations, consumer protection organizations, law enforcement agencies, security, insurance companies, financial institutions health care departments , cities and municipalities, utility companies, Airports and port authorities as well as private citizens.


PREREQUISITES:
Trainees will have a minimum of a degree or diploma from a recognized university or college any of the following areas: Law, Engineering, ICT, HR, Finance, Business , Arts, Social Sciences and any other related field.


MODE OF TRAINING
The training shall include power-point presentations, simulations, case studies, group
exercises, module Quizzes, and a final test. There shall be a quiz after each module. There
will be a final written Essay test for each group.


COURSE MODULES

Module one: Introduction to data Protection and Privacy
Module two: Data Governance
Module three: Data Protection Principles and Stake holders
Module four: Impact of Social Media and Internet on personal data privacy

 

COURSE SCHEDULE

DAY

MODULE

TOPICS

Day 1

Introduction to Data Protection and Privacy

History of data protection
Definitions and Acronyms
Introduction to Data Science

Day 2

Big data and data intensive systems

Big Data Analytic
Data at Rest and Data on Transit
Data Intensive Systems

Day 3

Data Governance

Data Protection Policies and Regulations

Data Protection Laws

Day 4

Personal Data Protection
Principles and Regulatory
Frameworks

EU General Data Protection Regulation (GDPR)
Data Regulatory Guidelines and Frameworks in other jurisdictions: UN, UK, OECD, Canada, South Africa (POPIA), Kenya
The Children's Online Privacy Protection Act-USA

Day 5

Data Protection Standards
and best practices

ISO/IEC 27001 ISMS and ISO/IEC 27701-2019 Privacy Information Management Standard
The Rights of Data Subjects

Day 6

Data Protection Stakeholders

Processing and usage of personal Data by third parties
Data Controllers, and data Processors
Roles of Data Protection Officers (DPOs) and Data Commissioners

Day 7

Impact of Social Media and
Internet on Personal Data and Privacy

Impact of Social Media and Internet on personal privacy
Online threats and Fraud using your personal data

Cyber hygiene best practices to protect personal data

Day 8

Cryptography and Encryption of data

Tools for protecting personal data online
Cryptography and Encryption
Cryptography and Encryption Exercises

Day 9

Advocacy and Public Education on Data Protection

Advocacy and Public Education on Data Protection
Educating mobile phone users on online risks and criminal activities
Online crime simulation over mobile phone

Day 10

Summary and Conclusions Course Evaluation

Evaluation and Feedback
Open forum discussions
Evaluation

Scroll to Top