Data Protection and Privacy Awareness and Cyber Health
INTRODUCTION:
The right to privacy is a fundamental right enshrined in many constitutions around the world, as well as in international human rights law. The right to privacy is multifaceted, but a fundamental aspect of it, increasingly relevant to people’s lives, is the protection of individuals’ data. As early as 1988, the UN Human Rights Committee, the treaty body charged with monitoring implementation of the International Covenant on Political and Civil Rights (ICCPR), recognized the need for data protection laws to safeguard the fundamental right to privacy recognized by Article 17 of the ICCPR.
Protecting privacy in the digital age is essential to effective and good democratic governance. However, despite increasing recognition and awareness of data protection and the right to privacy across the world, there is still a lack of legal and institutional frameworks, processes, and infrastructure to support the protection of data and privacy rights. At the same time, the increasing volume and use of personal data, together with the emergence of technologies enabling new ways of processing and using it, mean that regulating an effective data protection framework is more important than ever. Protecting privacy is essential, and the majority of States have adopted some forms of protection; however, frameworks are often inadequate, and have not kept up with modern uses of data and challenges they pose. Data protection laws need to be updated to face emerging challenges.
Governments across the world are radically changing policies and infrastructure, in the hope of enabling economic opportunity and attracting international investment, ensuring the security of their societies, and strengthening institutions. Governments are continuously developing new policies that demand more data from individuals: a vast change in the relationship between the individual and the State through the accumulation of data. It is not just about government, industry plays an essential role too: they promote the ideas, support the sales of such systems, and provide the tools and services. They may also control the data. This all results in what we call data-intensive systems. These are systems which process data about people, which generate additional data about people, and which rely on data to make decisions about people.
COURSE OVERVIEW:
Every time you use a service, buy a product online, register for email, go to your doctor, pay your taxes, or enter into any contract or service request, you have to hand over some of your personal data. Even without your knowledge, data and information about you is being generated and captured by companies and agencies that you are likely to have never knowingly interacted with. The only way citizens and consumers can have confidence in both government and business is through strong data protection practices, with effective legislation to help minimize state and corporate surveillance and data exploitation.
This course shall give trainees an insight into why it is important not to share personal and sensitive data with data collectors. The course shall also introduce participants to data protection principles, the rights of the citizen, data processors, data controllers and data protection laws in different countries. Trainees will be taken through the seven principles and guidelines of the EU GDPR as well as the expanded OAS Guidelines. Trainees will learn how to protect their personal and corporate data using software tools and algorithms as well as modern encryption techniques. Trainees will be taken through impacts of social media on personal data and how to reduce the threats from online activities.
TARGET AUDIENCES:
This course is targeting staff from Government, Private sector,
Data protection Authorities,
Regulatory Authorities, State law offices, Civil Society and human rights organizations, consumer protection organizations, law enforcement agencies, security, insurance companies, financial institutions health care departments , cities and municipalities, utility companies, Airports and port authorities as well as private citizens.
PREREQUISITES:
Trainees will have a minimum of a degree or diploma from a recognized university or college any of the following areas: Law, Engineering, ICT, HR, Finance, Business , Arts, Social Sciences and any other related field.
MODE OF TRAINING
The training shall include power-point presentations, simulations, case studies, group
exercises, module Quizzes, and a final test. There shall be a quiz after each module. There
will be a final written Essay test for each group.
COURSE MODULES
Module one: Introduction to data Protection and Privacy
Module two: Data Governance
Module three: Data Protection Principles and Stake holders
Module four: Impact of Social Media and Internet on personal data privacy
COURSE SCHEDULE
DAY
MODULE
TOPICS
Day 1
Introduction to Data Protection and Privacy
History of data protection
Definitions and Acronyms
Introduction to Data Science
Day 2
Big data and data intensive systems
Big Data Analytic
Data at Rest and Data on Transit
Data Intensive Systems
Day 3
Data Governance
Data Protection Policies and Regulations
Data Protection Laws
Day 4
Personal Data Protection
Principles and Regulatory
Frameworks
EU General Data Protection Regulation (GDPR)
Data Regulatory Guidelines and Frameworks in other jurisdictions: UN, UK, OECD, Canada, South Africa (POPIA), Kenya
The Children's Online Privacy Protection Act-USA
Day 5
Data Protection Standards
and best practices
ISO/IEC 27001 ISMS and ISO/IEC 27701-2019 Privacy Information Management Standard
The Rights of Data Subjects
Day 6
Data Protection Stakeholders
Processing and usage of personal Data by third parties
Data Controllers, and data Processors
Roles of Data Protection Officers (DPOs) and Data Commissioners
Day 7
Impact of Social Media and
Internet on Personal Data and Privacy
Impact of Social Media and Internet on personal privacy
Online threats and Fraud using your personal data
Cyber hygiene best practices to protect personal data
Day 8
Cryptography and Encryption of data
Tools for protecting personal data online
Cryptography and Encryption
Cryptography and Encryption Exercises
Day 9
Advocacy and Public Education on Data Protection
Advocacy and Public Education on Data Protection
Educating mobile phone users on online risks and criminal activities
Online crime simulation over mobile phone
Day 10
Summary and Conclusions Course Evaluation
Evaluation and Feedback
Open forum discussions
Evaluation