Skip to main content

Data Privacy and Protection: The Role of Regulation and Implications for Data Controllers in Developing Countries

  • Conference paper
  • First Online:
Information and Communication Technologies for Development (ICT4D 2020)

Abstract

Advances in new technologies present challenges to general expectations relating to collection, usage and cross-border control and transfer of personal data in recent times. Data has become the critical component of the fourth industrial revolution in global economies involving governments, businesses, and individuals. This paper considers the recent introduction of Data Protection Regulation in Nigeria (NDPR), which can be adjudged to have novel compliance structures globally. Using a qualitative approach, and further enabled by the institutional theory as a framework the paper examines the implications of the NDPR requirements for Data Controllers and Processors in key sectors of the economy. Findings from the study shows that there are five key components of the NDPR that can compel, motivate or support organizations to make significant structural changes such as standardization of processes, practices and IT assets to show conformity and/or gain legitimacy. The study equally identified the factors that facilitate or inhibit the adoption and implementation of the conditions of the NDPR categorised in line with the three pillars of the institutional theory framework. These findings projects policy direction in enhancing the institutionalisation of NDPR measures across key sectors. It will also inform businesses on necessary cause of action and changes to ensure privacy and protection of personal data collected from data subjects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Privacy International at the 62nd Session of the African Commission on Human and People’s Rights (ACHPR).

  2. 2.

    Barbulescu v. Romania (No. 61496/08).

  3. 3.

    Roman Zakharov v. Russia (No. 47143/06).

References

  1. Tikkinen-Piri, C., Rohunen, A., Markkula, J.: EU general data protection regulation: changes and implications for personal data collecting companies. Comput. Law Secur. Rev. 34(1), 134–153 (2018)

    Article  Google Scholar 

  2. Friedewald, M., Wright, D., Gutwirth, S., Mordini, E.: Privacy, data protection and emerging sciences and technologies: towards a common framework. Innov. Eur. J. Soc. Sci. Res. 23(1), 61–67 (2010)

    Article  Google Scholar 

  3. Roos, A.: Core principles of data protection law. Comp. Int. Law J. South. Afr. 39, 102 (2006)

    Google Scholar 

  4. Gellman, R.: Willis ware’s lasting contribution to privacy: fair information practices. IEEE Secur. Priv. 12(4), 51–54.Ge (2014)

    Google Scholar 

  5. Law of the Federal Republic of Nigeria: Chapter 4, Section 37 fundamental right of citizens to private and family life (2004)

    Google Scholar 

  6. Nigeria Data Protection Regulation (2019). Art 1.1. https://nitda.gov.ng/wp-content/uploads/2019/01/Nigeria%20Data%20Protection%20Regulation.pdf

  7. Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79, 119 (2004)

    Google Scholar 

  8. Lynskey, O.: Deconstructing data protection: the ‘added-value’ of a right to data protection in the EU legal order. Int. Comp. Law Q. 63(3), 569–597 (2014)

    Article  Google Scholar 

  9. Steinke, G.: Data privacy approaches from US and EU perspectives. Telemat. Inform. 19(2), 193–200 (2002)

    Article  Google Scholar 

  10. Birnhack, M.D.: The EU data protection directive: an engine of a global regime. Comput. Law Secur. Rev. 24(6), 508–520 (2008)

    Article  Google Scholar 

  11. United Nations Conference on Trade and Development UNCTAD (2020). Data Protection and Privacy Legislation Worldwide. https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eCom-Data-Protection-Laws.aspx. Accessed 18 Feb 2020

  12. Weerakkody, V., Dwivedi, Y.K., Irani, Z.: The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey. J. Inf. Technol. 24(4), 354–368 (2009)

    Article  Google Scholar 

  13. Miles, J.A.: Management and Organization Theory: A Jossey-Bass Reader. Wiley, Hoboke (2012)

    Google Scholar 

  14. DiMaggio, P.J., Powell, W.W.: The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. Am. Sociol. Rev., 147–160 (1983)

    Google Scholar 

  15. Jennings, P.D., Greenwood, R.: 6bConstructing the iron cage: Institutional theory and enactment’. Debating Organization: Point-Counterpoint in Organization Studies, 195 (2003)

    Google Scholar 

  16. Scott, R.W.: Institutions and organizations: ideas and interests (2008)

    Google Scholar 

  17. Clemens, E.S., Cook, J.M.: Politics and institutionalism: explaining durability and change. Annu. Rev. Sociol., 441–466 (1999)

    Google Scholar 

  18. Appari, A., Johnson, M. E., Anthony, D.L.: HIPAA compliance: an institutional theory perspective. In: AMCIS 2009 Proceedings, p. 252 (2009)

    Google Scholar 

  19. Greenway, K.E., Chan, Y.E.: Theoretical explanations for firms’ information privacy behaviors. J. AIS 6(6), 171–198 (2005)

    Google Scholar 

  20. D‟Arcy, J., Hovav, A.: An Integrative framework for the study of information security management research. In: Gupta, J., Sharma, S. (eds.) Handbook of Research on Information Security and Assurance, pp. 55–67. Idea Group Publishing (2009)

    Google Scholar 

  21. Dahiru, A.A., Bass, J.M., Allison, I.K.: Cloud computing adoption in sub-Saharan Africa: an analysis using institutions and capabilities. In: International Conference on Information Society (i-Society 2014), pp. 98–103. IEEE, November 2014

    Google Scholar 

  22. Glaser, B.G., Holton, J.: Remodeling grounded theory. Paper presented at the Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (2004). Author, F.: Article title. Journal 2(5), 99–110 (2016)

    Google Scholar 

  23. Naoum, S.G.: Dissertation Research and Writing for Construction Students, 3rd edn. Routledge, Abingdon (2013)

    Google Scholar 

  24. National Bureau of Statistics: Nigeria Economy Largest in Africa (2019). http://nigerianstat.gov.ng/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abubakar A. Dahiru .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agbali, M., Dahiru, A.A., Olufemi, G.D., Kashifu, I.A., Vincent, O. (2020). Data Privacy and Protection: The Role of Regulation and Implications for Data Controllers in Developing Countries. In: Bass, J.M., Wall, P.J. (eds) Information and Communication Technologies for Development. ICT4D 2020. IFIP Advances in Information and Communication Technology, vol 587. Springer, Cham. https://doi.org/10.1007/978-3-030-65828-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65828-1_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65827-4

  • Online ISBN: 978-3-030-65828-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics