Challenges in Implementing Data Protection Laws: Lessons Learnt from Developed Countries
DOI:
https://doi.org/10.47604/ijlp.1890Keywords:
Data Protection, Laws, Challenges, ImplementationAbstract
Purpose: The purpose of the study is to examine the challenges experienced in implementing data protection laws.
Methodology: This study adopted a desktop methodology. This study used secondary data from which include review of existing literature from already published studies and reports that was easily accessed through online journals and libraries.
Findings: The study concludes that monitoring and inspections by the regulatory authority regulatory bodies is not properly done because the regulatory authorities lack the resources to monitor and inspect.
Unique Contribution to Theory, Practice and Policy: The study was anchored on Adaptive Structuration Theory and Absorptive Capacity Theory. The study recommended that personal information processing management framework is required to aid the critical industries in understanding how personal information can be processed in line with the requirements of the Act. The study recommended that a wider variety of enforcement strategies should be used apart from the persuasion and warning letters issued to who do not comply.
Downloads
References
Abdulrauf, L. A., & Fombad, C. M. (2017). Personal data protection in Nigeria: Reflections on opportunities, options and challenges to legal reforms. Liverpool Law Review, 38, 105-134.
Ang, P. H., & Nadarajan, B. (1996). Censorship and the Internet: A Singapore perspective. Communications of the ACM, 39(6), 72-78.
Balkin, J. M. (2020). The fiduciary model of privacy. Harv. L. Rev. F., 134, 11.
Bhandari, V., Bailey, R., Parsheera, S., & Rahman, F. (2021). Comments on the (draft) Personal Data Protection Bill, 2019. Available at SSRN 4051127.
Cassim, F. (2015). Protecting personal information in the era of identity theft: Just how safe is our personal information from identity thieves?. Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad, 18(2), 68-110.
Dobkin, A. (2018). Information fiduciaries in practice: data privacy and user expectations. Berkeley Technology Law Journal, 33(1), 1-52.
Eboibi, F. E. (2021). Cybercriminals and Coronavirus cybercrimes in Nigeria, the United States of America and the United Kingdom: cyber hygiene and preventive enforcement measures. Commonwealth Law Bulletin, 47(1), 113-142.
Froomkin, M., & Colangelo, Z. (2020). Privacy as Safety. Wash. L. Rev., 95, 141.
Githige (2015), Factors influencing compliance with the Watershed Period among broadcasters in Kenya
Guracha, A., & Kiruthu, F. (2019). Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya. International Journal of Current Aspects, 3, 1-13.
Hartzog, W., & Richards, N. (2020). Privacy's constitutional moment and the limits of data protection. BCL Rev., 61, 1687.
Jones, P., Wynn, M., Hillier, D., & Comfort, D. (2017). The sustainable development goals and information and communication technologies. Indonesian Journal of Sustainability Accounting and Management, 1(1), 1â-15.
Krafft, M., Arden, C. M., & Verhoef, P. C. (2017). Permission marketing and privacy concerns"”Why do customers (not) grant permissions?. Journal of interactive marketing, 39(1), 39-54.
Lehto, M. (2018). Cyber security education and research in the Finland's universities and universities of applied sciences. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 248-267). IGI Global.
Manjoo, F. (2015). Right to be forgotten online could spread. New York Times.
Maras, M. H., & Wandt, A. S. (2019). Enabling mass surveillance: data aggregation in the age of big data and the Internet of Things. Journal of Cyber Policy, 4(2), 160-177.
Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45, 135-155.
Matz, S. C., Appel, R. E., & Kosinski, M. (2020). Privacy in the age of psychological targeting. Current opinion in psychology, 31, 116-121.
Medine, D., & Murthy, G. (2020). Making data work for the poor. CGAP, January, 1.
Neo, R. (2020). The securitisation of fake news in Singapore. International Politics, 57(4), 724-740.
NGETHE, N. S. (2021). INFORMATION SYSTEM SECURITY CONTROLS AND DATA SECURITY IN KIRIRI WOMEN'S UNIVERSITY OF SCIENCE AND TECHNOLOGY, KENYA (Doctoral dissertation, KENYATTA UNIVERSITY).
Parks, L., & Thompson, R. (2020). The Slow Shutdown: Information and Internet Regulation in Tanzania From 2010 to 2018 and Impacts on Online Content Creators. International Journal of Communication (19328036), 14.
Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment: Common data environment vulnerabilities and block chain deterrence. Engineering, Construction and Architectural Management.
Phillips, M. (2018). International data-sharing norms: from the OECD to the General Data Protection Regulation (GDPR). Human genetics, 137, 575-582.
Schwartz, P. M., & Peifer, K. N. (2017). Transatlantic data privacy law. Geo. LJ, 106, 115.
Schwartz, P. M., & Peifer, K. N. (2017). Transatlantic data privacy law. Geo. LJ, 106, 115.
Spiekermann, S., Acquisti, A., Böhme, R., & Hui, K. L. (2015). The challenges of personal data markets and privacy. Electronic markets, 25, 161-167.
Tikkinen-Piri, C., Rohunen, A., & Markkula, J. (2018). EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 34(1), 134-153.
Tshiani, V., & Tanner, M. (2018). South Africa's Quest for Smart Cities: Privacy Concerns of Digital Natives of Cape Town, South Africa. Interdisciplinary Journal of E-Learning & Learning Objects, 14.
Wachter, S., & Mittelstadt, B. (2019). A right to reasonable inferences: re-thinking data protection law in the age of big data and AI. Colum. Bus. L. Rev., 494.
Yeh, C. L. (2018). Pursuing consumer empowerment in the age of big data: A comprehensive regulatory framework for data brokers. Telecommunications Policy, 42(4), 282-292.
Zenda, B., Vorster, R., & Da Viega, A. (2020). Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa. South African Computer Journal, 32(1), 113-132.
Zenda, B., Vorster, R., & Da Viega, A. (2020). Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa. South African Computer Journal, 32(1), 113-132.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Leon Bwire
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.