I&M Bank House, 5th Floor, 2nd Ngong Avenue, Upper Hill, Nairobi, Kenya

Blogs

First-Party Data – A Case of Compliance and Privacy

Throughout the years we have seen the three main browsers that dominate the market, Google Chrome, Mozilla Firefox, and Apple

Data Protection

Kenya’s Cybercrime Regulations

In a bid to provide a more comprehensive and coordinated approach to cybersecurity, the Kenyan National Assembly recently approved the

Cyber Security

How to design and implement a Privacy Governance Framework for Compliance with Data Protection Laws

To address the complexities of data protection laws, organizations must implement an Enterprise-wide program that serves as an effective risk

Uncategorized

Managing Third-Party Vendors: The Significance of Data Processing Agreements. 

Learn about the significance of Data Processing Agreements (DPA's) in managing third-party vendors and ensuring data protection compliance. Explore the

Data Protection

Data Minimization

In an era where data reigns supreme, the principle of data minimization emerges as a critical aspect of responsible data

Data Protection

Understanding DPIA’s: When and Why It’s Important to conduct a Data Protection Impact Assessment

Learn about Data Protection Impact Assessments (DPIAs), their importance in data protection, and when they should be conducted to ensure

Data Protection

Understanding Consent in Data Protection: Your Key to Privacy 

Understand the crucial role of consent in data protection, ensuring you have control over your personal information, and learn about

Data Protection

Navigating the Right to Delete Personal Data: A Guide for Organizations

Unlocking Deletion Rights: Navigating data complexities and legal obligations. Delve into effective strategies for organizations to confidently navigate the intricate

Data Protection, Data Regulation, Data Security

Five critical issues that users of CCTV cameras must consider in the wake of the data protection act

5 CRITICAL ISSUES THAT USERS OF CCTV CAMERAS MUST CONSIDER IN THE WAKE OF THE DATA PROTECTION ACT Closed-circuit television

Cyber Security, Data Protection, Data Regulation, Data Security