I&M Bank House, 5th Floor, 2nd Ngong Avenue, Upper Hill, Nairobi, Kenya

Year: 2023

How to design and implement a Privacy Governance Framework for Compliance with Data Protection Laws

To address the complexities of data protection laws, organizations must implement an Enterprise-wide program that serves as an effective risk

Uncategorized

Managing Third-Party Vendors: The Significance of Data Processing Agreements. 

Learn about the significance of Data Processing Agreements (DPA's) in managing third-party vendors and ensuring data protection compliance. Explore the

Data Protection

Data Minimization

In an era where data reigns supreme, the principle of data minimization emerges as a critical aspect of responsible data

Data Protection

Understanding DPIA’s: When and Why It’s Important to conduct a Data Protection Impact Assessment

Learn about Data Protection Impact Assessments (DPIAs), their importance in data protection, and when they should be conducted to ensure

Data Protection

Understanding Consent in Data Protection: Your Key to Privacy 

Understand the crucial role of consent in data protection, ensuring you have control over your personal information, and learn about

Data Protection

Navigating the Right to Delete Personal Data: A Guide for Organizations

Unlocking Deletion Rights: Navigating data complexities and legal obligations. Delve into effective strategies for organizations to confidently navigate the intricate

Data Protection, Data Regulation, Data Security

Five critical issues that users of CCTV cameras must consider in the wake of the data protection act

5 CRITICAL ISSUES THAT USERS OF CCTV CAMERAS MUST CONSIDER IN THE WAKE OF THE DATA PROTECTION ACT Closed-circuit television

Cyber Security, Data Protection, Data Regulation, Data Security

Benefits of Out-Sourcing a Data Protection Officer

BENEFITS OF OUT-SOURCING A DATA PROTECTION OFFICER A data protection officer is an appointed official in an organization, whose chief

Data Protection, Data Regulation, Data Security

Data Security Today

Technology has so strongly been synced to our everyday lives and as a result, data security is both personal and

Data Security