Abstract
Advances in new technologies present challenges to general expectations relating to collection, usage and cross-border control and transfer of personal data in recent times. Data has become the critical component of the fourth industrial revolution in global economies involving governments, businesses, and individuals. This paper considers the recent introduction of Data Protection Regulation in Nigeria (NDPR), which can be adjudged to have novel compliance structures globally. Using a qualitative approach, and further enabled by the institutional theory as a framework the paper examines the implications of the NDPR requirements for Data Controllers and Processors in key sectors of the economy. Findings from the study shows that there are five key components of the NDPR that can compel, motivate or support organizations to make significant structural changes such as standardization of processes, practices and IT assets to show conformity and/or gain legitimacy. The study equally identified the factors that facilitate or inhibit the adoption and implementation of the conditions of the NDPR categorised in line with the three pillars of the institutional theory framework. These findings projects policy direction in enhancing the institutionalisation of NDPR measures across key sectors. It will also inform businesses on necessary cause of action and changes to ensure privacy and protection of personal data collected from data subjects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Privacy International at the 62nd Session of the African Commission on Human and People’s Rights (ACHPR).
- 2.
Barbulescu v. Romania (No. 61496/08).
- 3.
Roman Zakharov v. Russia (No. 47143/06).
References
Tikkinen-Piri, C., Rohunen, A., Markkula, J.: EU general data protection regulation: changes and implications for personal data collecting companies. Comput. Law Secur. Rev. 34(1), 134–153 (2018)
Friedewald, M., Wright, D., Gutwirth, S., Mordini, E.: Privacy, data protection and emerging sciences and technologies: towards a common framework. Innov. Eur. J. Soc. Sci. Res. 23(1), 61–67 (2010)
Roos, A.: Core principles of data protection law. Comp. Int. Law J. South. Afr. 39, 102 (2006)
Gellman, R.: Willis ware’s lasting contribution to privacy: fair information practices. IEEE Secur. Priv. 12(4), 51–54.Ge (2014)
Law of the Federal Republic of Nigeria: Chapter 4, Section 37 fundamental right of citizens to private and family life (2004)
Nigeria Data Protection Regulation (2019). Art 1.1. https://nitda.gov.ng/wp-content/uploads/2019/01/Nigeria%20Data%20Protection%20Regulation.pdf
Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79, 119 (2004)
Lynskey, O.: Deconstructing data protection: the ‘added-value’ of a right to data protection in the EU legal order. Int. Comp. Law Q. 63(3), 569–597 (2014)
Steinke, G.: Data privacy approaches from US and EU perspectives. Telemat. Inform. 19(2), 193–200 (2002)
Birnhack, M.D.: The EU data protection directive: an engine of a global regime. Comput. Law Secur. Rev. 24(6), 508–520 (2008)
United Nations Conference on Trade and Development UNCTAD (2020). Data Protection and Privacy Legislation Worldwide. https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eCom-Data-Protection-Laws.aspx. Accessed 18 Feb 2020
Weerakkody, V., Dwivedi, Y.K., Irani, Z.: The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey. J. Inf. Technol. 24(4), 354–368 (2009)
Miles, J.A.: Management and Organization Theory: A Jossey-Bass Reader. Wiley, Hoboke (2012)
DiMaggio, P.J., Powell, W.W.: The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. Am. Sociol. Rev., 147–160 (1983)
Jennings, P.D., Greenwood, R.: 6bConstructing the iron cage: Institutional theory and enactment’. Debating Organization: Point-Counterpoint in Organization Studies, 195 (2003)
Scott, R.W.: Institutions and organizations: ideas and interests (2008)
Clemens, E.S., Cook, J.M.: Politics and institutionalism: explaining durability and change. Annu. Rev. Sociol., 441–466 (1999)
Appari, A., Johnson, M. E., Anthony, D.L.: HIPAA compliance: an institutional theory perspective. In: AMCIS 2009 Proceedings, p. 252 (2009)
Greenway, K.E., Chan, Y.E.: Theoretical explanations for firms’ information privacy behaviors. J. AIS 6(6), 171–198 (2005)
D‟Arcy, J., Hovav, A.: An Integrative framework for the study of information security management research. In: Gupta, J., Sharma, S. (eds.) Handbook of Research on Information Security and Assurance, pp. 55–67. Idea Group Publishing (2009)
Dahiru, A.A., Bass, J.M., Allison, I.K.: Cloud computing adoption in sub-Saharan Africa: an analysis using institutions and capabilities. In: International Conference on Information Society (i-Society 2014), pp. 98–103. IEEE, November 2014
Glaser, B.G., Holton, J.: Remodeling grounded theory. Paper presented at the Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (2004). Author, F.: Article title. Journal 2(5), 99–110 (2016)
Naoum, S.G.: Dissertation Research and Writing for Construction Students, 3rd edn. Routledge, Abingdon (2013)
National Bureau of Statistics: Nigeria Economy Largest in Africa (2019). http://nigerianstat.gov.ng/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 IFIP International Federation for Information Processing
About this paper
Cite this paper
Agbali, M., Dahiru, A.A., Olufemi, G.D., Kashifu, I.A., Vincent, O. (2020). Data Privacy and Protection: The Role of Regulation and Implications for Data Controllers in Developing Countries. In: Bass, J.M., Wall, P.J. (eds) Information and Communication Technologies for Development. ICT4D 2020. IFIP Advances in Information and Communication Technology, vol 587. Springer, Cham. https://doi.org/10.1007/978-3-030-65828-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-65828-1_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65827-4
Online ISBN: 978-3-030-65828-1
eBook Packages: Computer ScienceComputer Science (R0)